Search This Blog

Thursday, September 02, 2010

Microsoft still mum on programs prone to DLL hijacking attacks

  Eight great virtual appliances for VMware, free for the downloading | US spends $11M to kick-start video search technology
 
  Network World Security

Forward this to a Friend >>>


Microsoft still mum on programs prone to DLL hijacking attacks
Microsoft on Tuesday again abstained from naming which of its Windows programs, if any, contain bugs that could lead to widespread "DLL load hijacking" attacks. Read More


WHITE PAPER: Checkpoint Software

Point Abra: A Secure Virtual Workspace
Discover how you can turn any PC into your own corporate desktop with a fully encrypted USB stick. Read now!

WHITE PAPER: Tripwire

Where Compliance and Data Protection Overlap
Today's CISOs face more challenges than ever, including increased and more sophisticated threats, complex IT environments, decreased budgets, and greater compliance pressures. But these challenges present opportunity. Learn how CISOs can play these challenges to their advantage to meet both data protection and compliance demands. Read More!

Eight great virtual appliances for VMware, free for the downloading
The combination of free open source and virtual machines is hard to beat; here are some of the handiest virtual appliances you'll find Read More

US spends $11M to kick-start video search technology
The US military is inundated with video from airborne unmanned aircraft, remote monitoring systems and security outposts. Read More

Gmail promo for Priority Inbox creeps out Chrome users
Chrome users yesterday bombarded Google's Gmail support forum with complaints about music suddenly playing in the background when they reached their inboxes. Read More


WHITE PAPER: Watchguard

Unified Threat Management - Market Review
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

Researchers build mysterious "Quantum Cats" from light
Quantum science researchers have found a way to manipulate light that could enhance precision measurements as well as computing and communications based on quantum physics theory th Read More

Check Point bolsters VMware security
Check Point's Security Gateway software is now available in a virtual edition that is compatible with VMware virtual environments. Read More

Cyber situational awareness for the electric power industry
Today we begin a series of articles about supervisory control and data acquisition (SCADA) systems and the need for increased security in national critical infrastructure using such systems. I have chosen the electric power industry as a focus because it is pervasive and indisputably critical to our national security. To set the stage for the series, here is an executive summary of the material to come in subsequent columns. Read More


WHITE PAPER: Cisco

Security in the Cloud
This technology dossier contains four papers that address security considerations in cloud computing. It includes IDG Research results on what IT managers have to say about cloud security, executive viewpoints on blending cloud solutions to optimize security, and a strategy paper that addresses protecting data. Read now!

Russian Trojan blamed for credit card losses at US diner
Hundreds of lunchtime customers of a diner in the US city of Memphis are believed to have had funds stolen from their debit and credit cards after PCs at the venue became infected with malware. Read More

Wikileaks servers move to nuclear bunker under Stockholm
The Wikileaks whistleblowing website has reportedly moved its server hosting to a Cold War bunker deep under the streets of Stockholm. Read More

Data breaches begin close to home
Last issue I pointed you to a story that Oracle's Mark Dixon had sent me about a manager who kept using the accounts of departed subordinates to co-sign authorizations that helped her steal $11 million dollars from her organization. Mark had more to say on data breaches, though. Read More

Quantum key security 'blinded' by new attack
A Norwegian team claims it has come up with a new way to hack quantum key encryption (QKD) systems that would allow an attacker to intercept a key without being detected. Read More

Join Network World's group on LinkedIn
Why join Network World's LinkedIn group? You can have interesting discussions with your peers, managed by Network World editors. You can make new contacts in your industry. It looks good on your profile. And of course, it's free. Join today. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Are you the corporate geezer?
Our first Geezer Quiz in 2009 has been so popular that we've created this new set of questions that will test your memory and perhaps also bring on a wave of nostalgia for the days of minicomputers, X.25 and token ring. Keep score and see how well you do at the end. Enjoy!

The hottest virtualization products at VMworld
With VMworld kicking off in San Francisco, this is one of the biggest weeks of the year in the virtualization industry. VMware, Citrix, EMC and many other companies are releasing new virtualization technologies or adding virtualization capabilities to existing products. Here's a roundup of what's being announced this week.

MOST-READ STORIES

  1. Burning Man's open source cell phone system could save the world
  2. Cisco patches bug that crashed 1% of Internet
  3. Skype under Cisco
  4. Security-as-a-service growing
  5. Burning Man is proving point for Earth friendly, Linux-based cell tower
  6. The hottest virtualization products at VMworld
  7. VMware aims to displace Windows with cloud-based desktop app
  8. Research experiment disrupts Internet, for some
  9. Microsoft: Xbox 360 S the best box we've ever built
  10. Paul Allen: MS co-founder, tech pioneer -- patent troll?
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: