Friday, September 10, 2010

Microsoft plans double-sized Patch Tuesday next week

  Cisco wireless controllers open to attack | NSF: Time for an Internet do-over
 
  Network World Security

Forward this to a Friend >>>


Microsoft plans double-sized Patch Tuesday next week
Microsoft plans to issue nine security updates to patch 13 bugs in Windows, Office and its Web server software next week. Read More


WHITE PAPER: NetGear

Miercom Lab Testing Summary Report - Email Threat Test
In its industry assessment of spam and web filtering products, Miercom tested Cisco, Barracuda and NETGEAR ProSecure. They determined the efficacy of spam filters based on content-analysis accuracy, email virus and malware detection, web filtering, real time web malware detection and more. Learn more.

WHITE PAPER: NetGear

NETGEAR® Stream Scanning Technology
Security solutions must keep a company safe from the constant barrage of Internet-based threats without slowing down the speed of business. Where other technologies have failed, NETGEAR Stream Scanning architecture successfully achieves this balance. Learn more.

Cisco wireless controllers open to attack
Cisco this week issued a security advisory for its wireless LAN controllers, which are susceptible to seven vulnerabilities including denial of service, privilege escalation and access control list bypass. The advisory can be found here. Read More

NSF: Time for an Internet do-over
The National Science Foundation (NSF) has doled out grants worth up to $32 million in total to a pack of universities dedicated to rethinking everything about the Internet from from its core routing system to its security architecture and addressing the emergence of cloud computing and an increasingly mobile society. Read More

Rackspace pulls plug on Koran-burning church's Web site
Citing violations of its terms of use, Rackspace has deactivated the Web site of that Florida church making worldwide headlines with its threat to burn Korans on the anniversary of the Sept. 11 attacks. While the decision is already being criticized in some circles as an affront to free speech, it makes nothing but good sense from a business perspective. From an AFP story: Read More


WHITE PAPER: HP

HP Business Value of EVA Storage Virtualization
This Edison Group report is an independent assessment of the architecture and business benefits of HP StorageWorks Enterprise Virtual Array (EVA). Learn how EVA enables access to the storage in a single array by numerous hosts, tiered storage within the array to different types of drives and better performance than non-virtualized systems. Read Now.

NASA Mars rover halfway to the promised crater
NASA's Mars rover Opportunity has reached the halfway point of what seems like a forever journey between two large craters on the red planet. Read More

Vulnerability management: The basics
The more apps companies deploy, the more complicated vulnerability management becomes. In the rush to find every security hole and seal it off from potential hackers, it's easy to let something important slip through. That's especially true if you're an IT administrator juggling several tasks of which security is one. Read More

Supernova shrapnel slammed into meteorite
Talk about finding a needle in a cosmic haystack. Scientists this week said they found microscopic shrapnel Read More


WHITE PAPER: HP

SMB: Data protection strategy for remote offices
Learn how midsize businesses or enterprises with regional data centers or remote offices can effectively address data protection challenges by implementing solutions that help store and protect business critical data, cut costs and improve efficiency and reliability. Read Now

Epic failures: 11 infamous software bugs
Mark your calendars! Sept. 9 is hereby declared Debugging Day. It's been associated with removing bugs for more than 50 years now but is rarely formally celebrated. So let's start the tradition this year. Read More

Warrants may be needed for cell phone data, court says
In a precedent-setting decision, a federal appellate court this week ruled that judges have the option of asking prosecutors to obtain a warrant before they are allowed to access to an persons cell phone location data. Read More

Hotel operator warns of data breach
An operator of upscale hotels and resorts under such widely-known names as Marriott, Sheraton and Westin. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

6 useful Wi-Fi tools for Windows
Free or cheap apps can help troubleshoot your wireless network, turn your laptop into a hot spot, and more.

IT personality types: 8 profiles in geekdom
Consider this your field guide to the flora and fauna of your work life: the eight classic personality types you'll find in virtually any reasonably sized IT department.

MOST-READ STORIES

  1. DARPA looking for extreme wireless interference buster
  2. The 22 best Android apps
  3. 10 businesses you can start from your smartphone
  4. Citrix strikes surprise blow against VMware with Cisco deal
  5. The Commodore 64 lives again - as a modern PC running Ubuntu
  6. Dell to make a play for Brocade?
  7. Enterprises clinging to IE6 may hurt IE9 launch
  8. Security vendor demonstrates insider attack on VMware ESX
  9. U.S. military hackers and spies prepare to knock the world offline
  10. Cisco, Citrix team on desktop virtualization package
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment