Tuesday, November 16, 2010

Why concurrent logins to a Windows network are a (very) bad idea

FBI site hits 2 million online criminal complaints | Fake antivirus still scamming naive consumers

Network World Security

Forward this to a Friend >>>


Why concurrent logins to a Windows network are a (very) bad idea
Once hackers gain legitimate Windows login credentials, they have unfettered use of themA vast number of Microsoft's security holes are dependent on the credentials of the user logged in when a Windows machine is hacked. But one of Windows' weakest areas of baked-in security is login controls. Third-party software, such as IS Decisions' UserLock takes on the task of filling in the gaps. Read More


WHITE PAPER: Trend Micro

Datacenter Security with Deep Security 7
Targeted threats are greater and more sophisticated than ever before, and data security compliance becomes more stringent every day. Your company needs uncompromising security that enables you to modernize your datacenter with virtualization and cloud computing without reducing performance. Read More!

WHITE PAPER: Sophos

The 10 myths of safe web browsing
Do you and your users practice safe web browsing? Avoid risky sites? Limit time spent online during work hours? Employ a rock-solid internet access policy? Use a secure browser? Have the experience to know a risky site when you see one? Read this white paper to learn more about the myths of safe web browsing. Read Now

FBI site hits 2 million online criminal complaints
FBI's Internet Crime Complaint Center logs 2 millionth complaintsNot too sure this is something to be proud of, but the FBI's Internet Crime Complaint Center (IC3) today said it logged its 2 millionth consumer complaint.  Read More

Fake antivirus still scamming naive consumers
Years after criminals started distributing fake antivirus software on a wide scale, UK consumers are still regularly falling for the scam, government-backed security organisation Getsafeonline has said. Read More

OPM delays launch of federal health claims database
The U.S. Office of Personnel Management has pushed back the planned launch of a controversial health claims database to Dec. 15. Read More


WHITE PAPER: Watchguard

10 questions to ask before you buy an anti‐spam solution
With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision. Read now!

Penetration tests: 10 tips for a successful program
Why are you performing penetration tests? Whether you're using an internal team, outside experts or a combination of the two, are you simply satisfying regulatory or audit requirements, or do you actually expect to improve enterprise security? Read More

Does Apple's Java move mean a less secure Mac?
Security experts are split over whether Apple's decision to hand over Java to an Oracle-backed open-source project is a good deal for Mac users. Read More

UK gov't warns on new tech's privacy implications
The Information Commissioner has said the privacy implications of new technologies should first be considered before they are launched. Read More


WHITE PAPER: Quest Software

Combating Security and Compliance Challenges
Don't wait for a security breach or compliance issue to damage your company. Ongoing monitoring can proactively identify and reduce threats. Learn how you can successfully stop security issues before they become serious problems. Read More

SCADA security and terrorism: The X-Force Report
Furthermore, many SCADA networks lack effective identification, authentication and authorization schemes to control access to the control systems. Firewalls are often missing because they slow down network throughput and therefore harm response time for critical actions in cases of trouble. Read More

Traveler to TSA: If you touch my junk, I'll have you arrested
Outrageous videos of TSA pat down security. A man has video proof that he was thrown out of an airport after refusing to submit to a security check "groin" pat down and then also threatened with a $10,000 fine and a civil suit if he left the airport. Another video shows a 3-yr-old girl screaming, "Quit touching me," while a TSA agent pats her down.Whether very young, very old, or in-between, if you fly then you may think TSA seems to be totally out of control with the "show us your body or we'll feel you up" routine. Yet there is little video or audio proof of what Americans are subjected to at airports. Read More

Best Networking Tweaks for Windows Server, Vista and XP
Like most Sys Admins, my job includes managing both Linux and Windows machines. This is the start of a two-part series regarding tweaks I have found for networking in each type of system. First up: Windows. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Traveler to TSA: If you touch my junk, I'll have you arrested
  2. Microsoft breaks petaflop barrier, loses Top 500 spot to Linux
  3. Cisco apps for the iPhone and iPad
  4. Best networking tweaks for Windows Server, Vista and XP
  5. Inside an alleged iPad killer: the Samsung Galaxy Tab
  6. Researchers take down Koobface servers
  7. Ex-Apple 'grip of death' exec lands at Cisco
  8. Man loses $20 million after taking laptop for repair
  9. What's at the core of Cisco's plight?
  10. Russian Armenian botnet suspect raked in €100,00 a month

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment