Friday, November 19, 2010

Multiple vulnerabilities in Cisco videoconferencing gear

Wiseguy scalpers bought tickets with CAPTCHA-busting botnet | Does Microsoft's Lync hype match customer desires?

Network World Security

Forward this to a Friend >>>


Multiple vulnerabilities in Cisco videoconferencing gear
Advisory notes holes in Linux- and VxWorks-based products Cisco issued a security advisory this week warning of multiple vulnerabilities in its videocoferencing products. The advisory can be found here. Read More


RESOURCE COMPLIMENTS OF: AccelOps

How is your SIEM silo'd– what's missing?
Inundated with logs, alert noise and admin tasks. Lack usability, coverage, context and results. AccelOps goes beyond SIEM for proactive monitoring, expedited incident analysis, report automation and compliance. Whether seeking or upgrading your SIEM, or exploring SOC/NOC convergence, experience AccelOps' difference with our 14-day trial download. Click to continue

WHITE PAPER: Oracle

Oracle Business Intelligence Enterprise Edition
This paper offers in-depth insights into Oracle business intelligence systems, including 11g design, BI server, analysis and reporting, BI interactive dashboard, scorecard and strategy management, and much more. Learn more

Wiseguy scalpers bought tickets with CAPTCHA-busting botnet
Three California men have pleaded guilty charges they built a network of CAPTCHA-solving computers that flooded online ticket vendors and snatched up the very best seats for Bruce Springsteen concerts, Broadway productions and even TV tapings of Dancing with the Stars. Read More

Does Microsoft's Lync hype match customer desires?
Customers eying Microsoft's Lync 2010 unified communications server need to take a step back and evaluate what's really new and whether they need it right now, down the road or not at all, experts say. Read More

Cisco co-founder now talks, lives, breathes turkey
Entrepreneur Sandy Lerner looks at world through her organic Ayrshire Farm No one would ever accuse Sandy Lerner of standing still too long and not trying new things. The co-founder of Cisco and founder of a major cosmetics company is now running a large organic turkey farm from her 3,000 acre spread in Virginia. Read More


WHITE PAPER: Oracle

Best Practices for a Data Warehouse on Oracle Database 11g
Increasingly companies are recognizing the value of an enterprise data warehouse (EDW). A true EDW provides a single 360-degree view of the business and a powerful platform for a wide spectrum of business intelligence tasks ranging from predictive analysis to near real-time strategic and tactical decision support throughout the organization. Learn more

52 percent of firms have no IT security guidelines for staff
More than half of small firms (52 percent) have no IT security guidelines in place for staff, meaning staff could be putting the firm at risk by downloading or visiting potentially dangerous websites from company PCs, says AVG. Read More

Intellect calls for private, public cybersecurity deal
Technology trade body Intellect has called for an effective cyber security partnership between industry and government. Read More

China telecom operator denies hijacking Internet traffic
China's largest fixed-line phone carrier has denied it hijacked worldwide Internet traffic this past April following a U.S. government report that said the company had redirected network routes through Chinese servers. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Gartner: Security policy should factor in business risks
Understanding the business risk posed due to security threats is crucial for IT managers and security officers, two analysts have claimed. Read More

Some tech issues may move forward in split Congress
Technology issues focused on growing the U.S. economy and creating jobs can move through a divided Congress next year, if lawmakers can set aside controversial issues such as network neutrality, some congressional observers said Thursday. Read More

Expert rebuts Bit9's "Dirty Dozen" shot at Chrome
The "Dirty Dozen" list most-vulnerable applications for 2010 from security vendor Bit9 this week puts the Google Chrome browser at the top. Now into the resultant debate steps Marc Maiffret, security expert  at eEye Digital Security, with a love song for Google Chrome. Read More

McAfee CEO: Intel acquisition not about silicon
In town for an executive summit event at the Steam Whistle Brewery, McAfee Corp. (NYSE: MFE ) CEO Dave DeWalt told customers and partners he believes Intel Corp. 's (NASDAQ: INTC ) blockbuster acquisition of the security vendor will create exciting possibilities. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Bug derailed Windows bid to top Linux in supercomputing speed
  2. Airports can legally opt-out, kick TSA program to the curb
  3. Google, Apple looking to introduce NFC capable smartphones
  4. Industrial Ethernet helped rescue Chilean miners
  5. Twitter generation failed The Science Guy? Nonsense.
  6. Free BlackBerry apps for the holidays
  7. Installing and using Ubuntu Netbook Edition
  8. Why U.S. IT jobs aren't coming back
  9. Report sounds alarm on China's rerouting of U.S. Internet traffic
  10. Google Chrome tops 'Dirty Dozen' vulnerable apps list

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment