Search This Blog

Thursday, October 07, 2010

Microsoft pitches PC isolation ward to defeat botnets

Gaping holes remain in US cybersecurity plan | Software aims to whack drive-by malware threat

Network World Security

Forward this to a Friend >>>


Microsoft pitches PC isolation ward to defeat botnets
Microsoft's security chief pitched a plan that would block some botnet-infected computers from connecting to the Internet. Read More


WEBCAST: Cisco Ironport Systems

Is Cloud Email Security Right for You?
Many companies are shifting email applications and data into the cloud model—and yet not without concerns about security. To be sure, business-critical data must be protected. In this webcast, Cisco's senior manager for cloud security, Joel McFarland, addresses the concerns and offers strategies to take control of email security. Learn More

WHITE PAPER: ForeScout

Choosing a Network Access Control System
This paper describes different types of network access control (NAC) systems and provides guidance as to which type would be best suited for your network. Learn More.

Gaping holes remain in US cybersecurity plan
President Obama's 2009 cyber policy review made 24 recommendations 2 have been implemented It's a huge undertaking but the overarching strategy to protect US assets from cyber attack remains pretty much just a paper plan.  Read More

Software aims to whack drive-by malware threat
Researchers show off BLADE tool aimed at Internet Explorer and Firefox exploitsThe nasty security attacks by drive-by malware are a growing threat to anyone who surfs across the Internet. For example, the Websense Security Lab recently said the number of Web sites with malicious software grew 225% in the last six months of 2009 alone and that most Web sites with malicious code are legitimate sites that have been hacked. Read More

Waging crypto wars 2.0
I was drawn to security in the early 90s during the crypto battle against the U.S. government, which was trying to force companies to adopt broken encryption with built in backdoors, like the failed Clipper Chip. Fortunately, the crypto wars were won by the side of reason, not least because of activists hoarding crypto technology in offshore locations. Read More


WHITE PAPER: Cisco

Cloud Security on IT's Terms
Outsourcing security has been controversial. There's simply too much at stake, some say, but new IDG research reveals the 51% of companies are either using or considering cloud-based security. This paper examines the top 3 myths of cloud security, email security in the cloud, as well as the importance of Data Loss Prevention. Read now!

Facebook says prosecution of billion-dollar spammer not over
Facebook isn't finished with a Canadian who was ordered to pay the company CDN$1 billion last week for spamming. Read More

Hackers break into Cryptome whistleblowing site
The Cryptome whistleblowing website was hacked last weekend in an attack that could have compromised sensitive data, possibly including the email addresses of top secret sources for leaks sent to the site. Read More

Why a "Sandbox" Makes Adobe Reader More Secure
Adobe released a major security update for Adobe Reader and Acrobat yesterday--a week ahead of the quarterly release scheduled for next Tuesday. At the same time, Adobe provided a glimpse at how "sandboxing" in the upcoming Adobe Reader Protected Mode will help prevent exploits even when vulnerabilities exist. Read More


WHITE PAPER: EMC

RSA Solution for Cloud Security and Compliance
RSA Solution for Cloud Security and Compliance offers a solid foundation that enables security and compliance of VMware environments to be addressed systematically so organizations can confidently continue their journey to virtualization and cloud computing models Read Now.

Fake spam Apple iTunes Store emails lead to dodgy sites
PandaLabs has warned of a spam scam involving genuine looking Apple iTunes Store receipts. Read More

Adobe hits Reader users with 23-patch 'whammy'
Adobe patched 23 security vulnerabilities in its Reader PDF viewer on Tuesday, most of them critical, including one that has been exploited by hackers for at least a month or possibly much longer. Read More

MoD urges staff not to use Facebook Places
The Ministry of Defence(MoD) has warned employees not to use Facebook's new geo-location service, Places. Read More

Fighting to keep bad stuff off Facebook
Not all of the 19 million Facebook "fans" of superstar Lady Gaga have her interests at heart. During a recent one-week period, 93 malicious links were posted on Lady Gaga's Facebook site to try to trick visitors into downloading dangerous malware. Plus, 372 postings were just pure spam and 1,717 "fans" were mouthing profanity. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

Ig Nobel honors world's wackiest researchers: 2010 winners
The 20th annual Ig Nobel Prizes were awarded Thursday night for "achievements that first make people laugh, and then make them think." The prizes commemorate the world's funniest research, and sometimes the world's biggest villains (BP is a winner this year). Here's a list of the 2010 prizes.

Eight hot commercial space projects
The recently passed NASA Authorization Act of 2010 was generally seen as a huge nod toward developing commercial space projects. NASA Administrator Charles Bolden said the authorization "launches a commercial space transportation industry." Indeed there are a number of interesting commercial space projects underway.

MOST-READ STORIES

  1. Top reason for Facebook unfriending: Too many useless posts
  2. iPhone vs. original Mac: A teardown showdown
  3. Understanding carrier grade NAT
  4. Can large scale NAT save IPv4?
  5. Microsoft IE browser share dips below 50%; Google Chrome rises
  6. How Treasury, AT&T botched billion-dollar network upgrade
  7. Cisco bolsters branch switches, routers
  8. What? Padmasree Warrior is now CTO, SVP and GM at Cisco?
  9. Cisco launches high-end security appliance
  10. Motorola shifts Wi-Fi smarts to access points

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: