TOP STORY: Microsoft, Google Spread Malware Hidden in Holiday Ads Microsoft and Google were handing out cheery holiday advertisements laced with poison in the form of drive-by-download malware. Web-based malware has doubled since last year, infecting more than 1.2 million websites last quarter.According to a third-quarter report from anti-malware firm Dasient, drive-by-downloads and rogue anti-virus schemes are the most popular methods of malware distribution. More than 1.2 million websites were infected with malware last quarter, doubling the malware infection rate of the same quarter a year ago. A great example of this occurred last week when Microsoft and Google were handing out cheery... Read More WEBCAST: Choosing Enterprise Firewall for 2011 & Beyond (Palo Alto Networks) Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more! | Navy's electromagnetic railgun pumps out world record blast Electromagnetic railgun fires off a mach 5 shotThe US Navy has fired off what it called a world-record, mach 5 velocity shot of its high-energy electromagnetic railgun it says can now hit targets 110 nautical miles away. Read More IPv4 Reputation Filtering Not a Long-Term Solution As carriers deploy Large Scale NAT (LSN) reputation filtering will lose its effectivenessAs public IPv4 addresses become more scarce, multiple-layers of NAT will be required to sustain the Internet for years to come. Use of Large Scale NAT (LSN) systems by service providers will cause problems for many applications. Today there are many security filtering systems that use lists of public IPv4 addresses to identify "undesirable" hosts on the Internet. As more ISPs deploy LAN systems... Read More WHITE PAPER: Unified Threat Management - Market Review (Watchguard) Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now! | Gawker Media hacked, warns users to change passwords E-mail addresses and password details for 200,000 registered users of Gawker Media websites are now circulating on peer-to-peer networks after a weekend hack attack. The company warned users to change their passwords -- including on other sites, if they use the same passwords elsewhere. Read More What to do if your Gawker password was violated If you think your Gawker account has been compromised by this weekend's attack and you want to cancel it, you can't. Read More WHITE PAPER: Clearing the Confusion About Fabric-Based Infrastructure (Brocade) A fabric-based computing architecture can support virtualization and cloud computing. Distinguishing between fabric-based computers and fabric-based data centers is critical to select the best technologies and products. Read this paper to learn more. Read now! | Protect Your Laptop Laptops can be stolen. Neoflyer asked the Answer Line forum for tips on protecting them. Read More Secure Flash Drives Lock Down Your Data Hollywood makes secure flash storage look easy. If the bad guy steals a thumb drive, it either blows up or some secret counterintelligence agency marshals the nation's resources in a no-holds-barred data hunt--most likely with Bruce Willis or Tommy Lee Jones working the streets. If the good guy steals the drive, it goes to a special-needs, special-deeds sidekick in a basement somewhere who cracks the code in 5 minutes. Read More WHITE PAPER: Network Managers' 10 Most-Challenging I&O Trends (Brocade Communications Inc.) Gartner has identified 10 key infrastructure and operations trends that will significantly affect network design and planning during the next three years. In this paper recommendations are made to deal with each of them. Read now! | McDonald's Customer Data Compromised through Contractor McDonald's is warning customers to be on guard against identity theft, phishing attacks, or other scams thanks to a data breach. What makes the data compromise more concerning is that it is indicative of a growing hacker strategy to go for the low-hanging fruit rather than staging a direct attack. Read More Website attackers could be easily traced, researchers say People using a tool to conduct distributed denial-of-service (DDOS) attacks against other websites in support of WikiLeaks can easily be traced, according to computer security researchers. Read More Prosecuting WikiLeaks' Assange could be 'difficult' case Prosecuting WikiLeaks founder Julian Assange for the disclosure of classified State Department cables will pose huge challenges for the U.S. government, according to a report by the Congressional Research Service. Read More Mozilla patches 13 Firefox security bugs Mozilla Thursday issued patches for 13 bugs, 11 of which were rated 'critical.' Read More Cloud coming but security makes it gray: Cisco study Survey tracks trends, strategies, concerns in data center and cloud computing Cisco this week finished up its three part Connected World study by finding that IT is moving to cloud computing but grappling with security and control over data. Fifty-two percent of IT officials responding to a Cisco study use or plan to use cloud computing with high adoption rates in India, Brazil and China. Read More |
No comments:
Post a Comment