Friday, December 10, 2010

Regulatory compliance hogs security pros’ attention; What it's like to get hit with a DDoS attack

What it's like to get hit with a DDoS attack | NASA sold PCs without wiping sensitive data

Network World Compliance

Forward this to a Friend >>>


Regulatory compliance hogs security pros' attention
One out of every two IT security professionals spends 50% of the work week on regulatory compliance initiatives, according to a new survey sponsored by eEye Digital Security. Read More


WHITE PAPER: F5 Networks

Load Balancing 101: Firewall Sandwiches
This white paper will show how you can implement ADCs in a "firewall sandwich" to improve availability, scalability, and manageability across the IT infrastructure. Read now!

In this Issue


WHITE PAPER: Dell & Intel

Seven Ways to Win with Win 7
Are you ready for Windows 7? The migration doesn't have to be costly and difficult if you have the right support and services. Upgrading your desktop operating system will lead to improved efficiency and productivity, enhanced security, and a lower cost of ownership. Here's how to win with Windows 7. Learn More Today!

What it's like to get hit with a DDoS attack
Google. Twitter. Government websites. Fortune 500 companies. All have been victims of crippling distributed denial-of-service (DDoS) attacks. The attacks have grown in reach and intensity thanks to botnets and a bounty of application flaws. And Akamai Technologies has a seen it all firsthand. Read More

NASA sold PCs without wiping sensitive data
NASA has revealed that 10 computers used for its space shuttle program were sold to the public without being wiped of sensitive data. Read More

31 "How To" resources you might have missed
Between Network World and its sister publications we've produced a dizzying number of "How To" articles this year. Here's a handy roundup of some of the most useful, featuring pieces on everything from Android smartphones to Windows 7 to full disk encryption. Read More

Recession hit IT wages across U.S.
The recession that officially ended last year hit tech workers wages across the U.S., with Silicon Valley workers seeing the biggest drop. Read More

Juniper acquires virtualization security firm
Juniper Networks Monday announced it has acquired Altor Networks, a provider of virtualization security for data centers, for $95 million. Read More

Zenprise extends mobile security to line-of-business apps
Zenprise has beefed up enterprise mobile security by adding to its MobileManager application new features that can be applied to Google Android, Apple iOS and Windows Mobile smartphones and other devices. Read More


WHITE PAPER: IBM

Achieving True Collaboration in Global Development
Globalization has given organizations around the world unprecedented access to personnel and to marketplaces. For some, this has meant the growth of the distributed organization. For others, globalization has meant the routine outsourcing of functions that only a few years ago were considered core capabilities. Still others combine the practices. Click to Continue

Porn-site visitors could score a payday for theft of their browser histories
Visitors to www.youporn.com over the past four years could be in store for a payday if a case against operators of the site proves they stole browser histories from visitors. Read More

Top Security Predictions for 2011
Aside from the festivities of the holidays, one thing that always makes December special is the combination of reflecting on the year gone by, and looking ahead to what the next year might hold. It is filled with top 10 lists and predictions on every imaginable topic. Read More

FTC reaches for the 'do not track' button
The FTC wants a new framework to address privacy challenges, including a "do not track" setting so consumers can choose whether to let entities collect data regarding their online searching and browsing activities. Read More

Expert: As smartphones become wallets, pickpockets circle
Androids, iPhones and BlackBerries are becoming more like wallets each day -- and the bad guys are starting to take notice, eEye CTO Marc Maiffret warns. Read More

IE9 'Do Not Track' Feature Prone to User Error
Microsoft today revealed a new security control in Internet Explorer 9 which will enable users to restrict sites from tracking them. The ability to control access to tracking data from within the browser is a welcome addition, but the feature is not exactly fool-proof. Read More

Top Secret! Keep Your E-Mail Private and Secure
E-mail is one of the most widely used forms of communication today. Estimates from May 2009 suggest that around 250 billion--with a "B"--e-mails are sent every day. That equates to more than 2.8 million e-mail messages per second, and some of them are not even spam. Read More


WHITE PAPER: Dell & Intel

Shifting to the Revolutionary Cloud
Prepare for the future and enter the new world of private clouds. As more enterprises move from public to private clouds, scaled-out applications will become more prevalent. More scalable apps means more efficiency, better response time and enhanced end-user experiences. Join the cloud revolution. Read More!

MasterCard SecureCode service impacted in attacks over WikiLeaks
The attacks against MasterCard by WikiLeaks supporters that knocked the credit card company's Web site offline today may have caused more problems for the card company than previously thought. Read More

Keep Your Credit Cards Safe From Skimmers
You're in a restaurant, enjoying a deep conversation. Peripherally, you see the waiter take your credit card and return a few minutes with a slip for you to sign. You think nothing of it until a few hours later when you receive a call from your bank: Someone is racking up serious debt on your credit card, mostly for electronics purchases. Is it you? Read More

ZeuS-style banking Trojans seen as greatest threat to online banking: Survey
A survey of financial services professionals at 70 banks found more than half considered real-time man-in-the-middle attacks from banking Trojans such as ZeuS and Clampi on compromised customer computers to be the greatest threat to online banking today. Read More

Apple patches 15 QuickTime bugs in Leopard, Windows
Apple on Tuesday patched 15 vulnerabilities in its QuickTime media player for Windows and Mac OS X 10.5, aka Leopard. Read More

Google quashes 13 Chrome bugs, adds PDF viewer
Google on Thursday patched 13 vulnerabilities in Chrome as it shifted the most stable edition of the browser to version 8. Read More

AVG antivirus users in reboot chaos after bad update
Antivirus company AVG has had to issue roll-back instructions to users of the free edition of its AVG 2011 program after 64-bit versions of Windows fail to reboot correctly after a mandatory update. Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Top IT Turkeys of 2010
Thanksgiving is a time for giving thanks for all of the people and things we love, to cherish what's most important to us. But that's for another slideshow. This one's all about taunting the companies, products and people who most resembled a turkey over the last year. So cut me a hockey-puck-shaped slice of jellied cranberry sauce and read on.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Fix to Chinese Internet traffic hijack due in January
  2. MasterCard website partially frozen by DDOS attack
  3. VMware to virtualize Android smartphones for business users
  4. Porn site visitors could score a payday for theft
  5. China telecom operator denies hijacking Internet traffic
  6. WikiLeaks founder praised by Pentagon Papers exposer
  7. Google's Chrome OS is no Windows killer just yet, analyst says
  8. What it's like to get hit with a DDoS attack
  9. Test: Best NAS boxes for less than $1,000
  10. 31 "How-to" resources you might have missed

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment