Search This Blog

Thursday, October 28, 2010

Mozilla patches Firefox zero-day bug in 48 hours

Symantec writes off $10 million after faulty AV activation | Fighting botnets: Service rates reputation of IP addresses

Network World Security

Forward this to a Friend >>>


Mozilla patches Firefox zero-day bug in 48 hours
Less than 48 hours after receiving a report of a critical flaw in Firefox, Mozilla issued an emergency update on Wednesday that patched the problem. Read More


WEBCAST: NetApp

Use 50% Less Storage - Guaranteed
Listen to this on-demand Webcast and hear Chris Rima of Tucson Electric Power discuss how his organization managed data growth and improved performance with storage and server virtualization. You'll also hear Brian Garrett from ESG and NetApp experts discuss ways to consolidate your Windows® application data, files, and virtual machines. Learn More

WHITE PAPER: VMware

EMC Runs Its Business-Critical Oracle E-Business Suite
Learn how EMC built their infrastructure using VMware software running on Intel-powered hardware and how they plan to move towards 100 percent virtualization within the organization. Read Now.

Symantec writes off $10 million after faulty AV activation
Symantec has been forced to write off US$10 million in revenue after a glitch in its sales system prevented some consumers from activating their Norton antivirus software at the time they bought it. Read More

Fighting botnets: Service rates reputation of IP addresses
Startup service provider ipTrust today said it was offering a program that lets businesses avoid botnets and infected machines by letting them know whether IP addresses are linked to suspicious behavior. Read More

Flash Drive 101: Copying Files, Removing Viruses
The other day, my wife asked me how to copy a PowerPoint presentation to a flash drive so she could take it with her to school. I was a little shocked. My very own wife doesn't know how to do this? I've failed as a husband! Read More

A real-world case study of SCADA security
The clear message given in the report was that the water and power distribution networks owned and operated by this organization were vulnerable to serious service disruptions or degradations by moderately trained external personnel without access to internal networks or information. Read More

Consumer smartphones to get remote wipes and SIM swap alerts
Consumer smartphone users could soon be given access a range of advanced security features previously offered only to large corporates, after equipment maker Juniper announced new software for mobile networks. Read More


WHITE PAPER: F5 Networks

F5 Application Ready Solutions with VMware View
As a VMware partner, F5 has thoroughly tested and documented the benefits of using our Application Delivery Networks with VMware View 4.5. F5 solutions include secure access, single- sign-on, load balancing, and server health monitoring. Read now!

Palin e-mail snoop begs court for leniency
Sentencing nears in case that also involved whistleblower site Wikileaks Lawyers for 22-year-old David Kernell, whose criminal prying into Sarah Palin's personal e-mail account caused an uproar two months before the 2008 presidential election, is asking a judge for probation instead of the jail term being sought by prosecutors. Read More

Ghosts of NASA satellite will haunt Johns Hopkins new data center
Johns Hopkins get new lab in former NASA buildingIf researchers at Johns Hopkins forthcoming high-performance data center develop a mysterious, overwhelming urge to develop outer space applications, there may be a reason. Read More

SecureMac alerts Mac users to new Trojan Horse
SecureMac claims to have discovered a new Trojan Horse in the wild that could cause problems for anyone running a Mac. Read More

NASA to auction automated software code generation patents
NASA says spacecraft control system translates well into commercial software developmentNASA's Goddard Space Flight Center said it is set to auction an exclusive license to five patents it holds for automated software development on November 11, 2010. NASA said the technology was originally developed to handle coding of control code for spacecraft swarms, but it is applicable to any commercial application where rule-based systems development is used. Read More

56% of all dangerous websites end in .com
More than half (56 percent) of all risky websites end in .com, says McAfee. Read More


WHITE PAPER: Sophos

How to implement a data loss prevention strategy
This paper guides IT professionals through the steps necessary to implement a practical data loss prevention (DLP) strategy. It starts off by quickly looking at what's driving data loss prevention, the consequences of data loss and how it can be comprehensively tackled using Sophos solutions. Read Now

Researchers Figure Out How to Beat Indestructible Cookie
Evercookie is a JavaScript tool for data miners, was updated recently. Evercookie is a tracking cookie technology of sorts, but it's made using JavaScript, and it doesn't go away when you delete your browser's cookies. Read More

Firefox Trojan Targets Older Versions of Windows
A new Firefox vulnerability reported on Tuesday affects primarily users of the browser on older versions of Windows, security firm Trend Micro has determined. Read More

Fraudsters find holes in debit card fraud detection
Over the last few weeks, criminals have been exploiting weak fraud detection systems used for debit cards with "flash" attacks, where hundreds of withdrawals are made over a very short period of time. Read More

LimeWire Shut Down Permanently
File-sharing program LimeWire has been permanently shut down after a federal judge found it guilty of assisting users in committing copyright infringement "on a massive scale." Read More

SAP user group: IT directors frustrated over roadmap secrecy
Eighty two percent of IT directors in the UK are frustrated about a lack of clarity from their suppliers over product plans, and are considering switching vendors as a result. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The Google Android Quiz
Android OS, with its openness, readily developed applications and flexibility has anchored a new wave of mobile devices that are rapidly gaining popularity. Here's a quiz about the operating system, its devices and history to see how well you really know it. Keep score and rank yourself at the end.

25 hot products from new IT companies
Network World's 25 New IT Companies to Watch are building a broad array of new IT products for the cloud computing and virtualization age. Here's a look at the 25 new IT companies and the technologies they're offering.

MOST-READ STORIES

  1. Hey, you with the open Wi-Fi: You're an idiot
  2. Google now second-largest ISP, carries 6.4% of Internet traffic
  3. Steve Jobs' business card from 1979
  4. Oracle's Ellison vows to prove new HP CEO in on scheme
  5. Open source report: Ubuntu moves away from GNOME
  6. The Google Android quiz
  7. AT&T lagging while others lead on IPv6
  8. How to protect against Firesheep attacks
  9. Single mom of four wins Windows Phone 7 app contest
  10. Microsoft Server 2008 gets virtualization boost

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: