Search This Blog

Tuesday, December 14, 2010

Microsoft, Google Spread Malware Hidden in Holiday Ads

Navy's electromagnetic railgun pumps out world record blast | IPv4 Reputation Filtering Not a Long-Term Solution

Network World Security


TOP STORY: Microsoft, Google Spread Malware Hidden in Holiday Ads
Microsoft and Google were handing out cheery holiday advertisements laced with poison in the form of drive-by-download malware. Web-based malware has doubled since last year, infecting more than 1.2 million websites last quarter.According to a third-quarter report from anti-malware firm Dasient, drive-by-downloads and rogue anti-virus schemes are the most popular methods of malware distribution. More than 1.2 million websites were infected with malware last quarter, doubling the malware infection rate of the same quarter a year ago. A great example of this occurred last week when Microsoft and Google were handing out cheery... Read More

WEBCAST: Choosing Enterprise Firewall for 2011 & Beyond (Palo Alto Networks)
Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more!

Navy's electromagnetic railgun pumps out world record blast
Electromagnetic railgun fires off a mach 5 shotThe US Navy has fired off what it called a world-record, mach 5 velocity shot of its high-energy electromagnetic railgun it says can now hit targets 110 nautical miles away. Read More

IPv4 Reputation Filtering Not a Long-Term Solution
As carriers deploy Large Scale NAT (LSN) reputation filtering will lose its effectivenessAs public IPv4 addresses become more scarce, multiple-layers of NAT will be required to sustain the Internet for years to come. Use of Large Scale NAT (LSN) systems by service providers will cause problems for many applications. Today there are many security filtering systems that use lists of public IPv4 addresses to identify "undesirable" hosts on the Internet. As more ISPs deploy LAN systems... Read More

WHITE PAPER: Unified Threat Management - Market Review (Watchguard)
Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming. Read now!

Gawker Media hacked, warns users to change passwords
E-mail addresses and password details for 200,000 registered users of Gawker Media websites are now circulating on peer-to-peer networks after a weekend hack attack. The company warned users to change their passwords -- including on other sites, if they use the same passwords elsewhere. Read More

What to do if your Gawker password was violated
If you think your Gawker account has been compromised by this weekend's attack and you want to cancel it, you can't. Read More

WHITE PAPER: Clearing the Confusion About Fabric-Based Infrastructure (Brocade)
A fabric-based computing architecture can support virtualization and cloud computing. Distinguishing between fabric-based computers and fabric-based data centers is critical to select the best technologies and products. Read this paper to learn more. Read now!

Protect Your Laptop
Laptops can be stolen. Neoflyer asked the Answer Line forum for tips on protecting them. Read More

Secure Flash Drives Lock Down Your Data
Hollywood makes secure flash storage look easy. If the bad guy steals a thumb drive, it either blows up or some secret counterintelligence agency marshals the nation's resources in a no-holds-barred data hunt--most likely with Bruce Willis or Tommy Lee Jones working the streets. If the good guy steals the drive, it goes to a special-needs, special-deeds sidekick in a basement somewhere who cracks the code in 5 minutes. Read More

WHITE PAPER: Network Managers' 10 Most-Challenging I&O Trends (Brocade Communications Inc.)
Gartner has identified 10 key infrastructure and operations trends that will significantly affect network design and planning during the next three years. In this paper recommendations are made to deal with each of them. Read now!

McDonald's Customer Data Compromised through Contractor
McDonald's is warning customers to be on guard against identity theft, phishing attacks, or other scams thanks to a data breach. What makes the data compromise more concerning is that it is indicative of a growing hacker strategy to go for the low-hanging fruit rather than staging a direct attack. Read More

Website attackers could be easily traced, researchers say
People using a tool to conduct distributed denial-of-service (DDOS) attacks against other websites in support of WikiLeaks can easily be traced, according to computer security researchers. Read More

Prosecuting WikiLeaks' Assange could be 'difficult' case
Prosecuting WikiLeaks founder Julian Assange for the disclosure of classified State Department cables will pose huge challenges for the U.S. government, according to a report by the Congressional Research Service. Read More

Mozilla patches 13 Firefox security bugs
Mozilla Thursday issued patches for 13 bugs, 11 of which were rated 'critical.' Read More

Cloud coming but security makes it gray: Cisco study
Survey tracks trends, strategies, concerns in data center and cloud computing Cisco this week finished up its three part Connected World study by finding that IT is moving to cloud computing but grappling with security and control over data. Fifty-two percent of IT officials responding to a Cisco study use or plan to use cloud computing with high adoption rates in India, Brazil and China. Read More


FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. Apple quietly drops iOS jailbreak detection API
  2. Has progress been made in fighting DDoS attacks?
  3. Jackass IT: Stunts,idiocy, and hero hacks
  4. The 20 biggest tech failures of 2010
  5. Apple, Google make DoD jump through hoops
  6. Favorite cheap network tools
  7. Why IT jobs are never coming back
  8. Cisco's most recent acquisition gains it network management
  9. It's two, two, two phones in one
  10. 10 things you can (and can't) do with the Google PC

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: