Search This Blog

Wednesday, August 11, 2010

Registry hack allows Windows XP SP2 patching

The Security Industry Needs to do More Around Web Threats | NASA's head techie seeks best systems engineers of the future

Network World Security

Forward this to a Friend >>>


Registry hack allows Windows XP SP2 patching
People still running the now-retired Windows XP Service Pack 2 can trick the operating system into installing security updates, a researcher said Monday. Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

60 Minutes w/ Security Visionary Nir Zuk
Join Nir Zuk, network security visionary and founder of Palo Alto Networks, for a live video interview. Nir was one of the developers of stateful inspection firewall technology, worked on the world's first IPS appliance and is now pioneering next-gen firewalls. Watch Nir speak about the state of info security industry and pose your questions to him.

WHITE PAPER: Palo Alto Networks

Re-Inventing Network Security
Enterprise networks and applications have evolved but security infrastructure has not. Learn why application visibility and control (regardless of port, protocol, or encryption) are critical for preventing increasingly sophisticated threats that target enterprise users and data. Read now!

The Security Industry Needs to do More Around Web Threats
If you aren't familiar with web threats you should be. A web threat uses the ubiquity of the WWW as a threat vector to propagate malicious exploits and payloads. Web threats lead to infected PCs with keyboard loggers, botnet code, or traditional worms and viruses. Traditional threats like email viruses and automated Internet worms still exist, but the bad guys now find the web more more effective.... Read More

NASA's head techie seeks best systems engineers of the future
In an open letter to current and future college students, NASA Chief Technologist Dr. Robert Braun wrote this week that "Good systems engineers are not born; they are created over time." Read More


WHITE PAPER: HP

IT Lessons from Grade School
Many of today's schools have a hodgepodge of outdated, nonstandard PCs, servers and printers, and little—if any—on-site IT support. Yet data collection and reporting requirements are driving school districts to upgrade and centralize their IT systems. Read Now

BlackBerry service to be monitored in Saudi Arabia
BlackBerry data services can continue in Saudi Arabia after Research in Motion agreed to monitoring of e-mail and instant messaging data services, an official of the country's regulator, Communications and Information Technology Commission, (CITC) said on Tuesday. Read More

U.K. bank hit by massive fraud from ZeuS-based botnet
Security vendor M86 Security says it's discovered that a U.K.-based bank has suffered almost $900,000 (675,000 Euros) in fraudulent bank-funds transfers due to the ZeuS Trojan malware that has been targeting the institution. Read More


E-GUIDE: Force10 Networks Inc.

Examining Nuances of the Cloud
Choosing the best cloud strategy means understanding the promises and pitfalls of each approach. This Network World eGuide provides expert articles on the nuances between different cloud strategies, best practices on building a hybrid cloud and making sure you have an exit strategy in case the cloud does not work out. Read More Now

Zeus Trojan raids 3,000 UK bank accounts
The attacks on UK online bank customers just keep coming. This time security company M86 Security has uncovered evidence that the Zeus Trojan recently broke into the accounts of around 3,000 customers at a major high street bank, stealing over $1million. Read More

How to Protect Your Smartphone's Valuable Data
So you just lost your smartphone. It isn't the end of the world, but it sure feels like it. Read More

Tighten Your PC's Security With Encrypt Stick
Encrypt Stick (free and $40 versions) is one of the most secure and least intrusive ways to encrypt sensitive data. It leaves no footprint on your (or others') PC, because it resides on and runs off a flash drive, and will run on both PCs and Macs. It also uses polymorphic encryption (the algorithm will change for each device it runs from) that the company claims is 10 times faster than 256-bit AES, and even provides a nifty virtual keyboard to prevent keylogging of any sort. Read More

Getting VDI right
Desktop virtualization makes it possible to centralize control and simplify management, improve security and compliance, and minimize help desk calls. It isn't perfect for all types of users within the enterprise, but when deployed appropriately, VDI can unlock new capabilities that could never be achieved through traditional physical desktop solutions. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Supersize your WAN
Dual-WAN routers have come a long way. WAN connections are easier to establish, and all units we tested have configurable load balancing. The performance increase, not to mention the redundant Internet connections that all but guarantee uptime, should put these dual-WAN routers at the top of the shopping list for every small business that needs a router.

The recent history of governments vs. the Internet
Since the Web makes it far easier to access information than ever before, governments have had a harder time keeping the lid on information they don't want the public to consume and have often found themselves butting heads with tech companies who deliver Internet services or content. Here are some doozies.

MOST-READ STORIES

  1. Google CEO Schmidt: No anonymity is the future of the Web
  2. Investment in open source software will only go up from here
  3. Who has the better virtualization platform - VMware or Microsoft?
  4. HP researcher claims to crack compsci complexity conundrum
  5. FTC busts domain name scammers
  6. Tech's most notorious CEO scandals
  7. Is there a patch for stupid?
  8. Verizon LTE plans leaked
  9. Are new IETF switching, routing specs needed?
  10. Google-Verizon net neutrality plan raises questions

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: