Thursday, December 23, 2010

Researchers reveal attack code for new IE zero-day

US to offer plethora of prize competitions to solve tough problems | Protect Your Backup Data from Murphy's Law

Network World Security


TOP STORY: Researchers reveal attack code for new IE zero-day
Microsoft is investigating claims by security researchers of an unpatched bug in Internet Explorer that could be used to hijack Windows-based PCs. Read More

WHITE PAPER: The Three Ps of Evaluating Managed Network Services (Qwest)
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

US to offer plethora of prize competitions to solve tough problems
Bill authorizes Feds to use prize competitions to solve complicated problemsGot a complicated problem? Hold a prize competition to solve it.  That's the basic idea behind the America Competes Act renewed by Congress this week. Read More

Protect Your Backup Data from Murphy's Law
Have you ever noticed that insurance seems to operate on the Murphy's Law principle? If you have it, you never need it, but as soon as the insurance is gone a catastrophe strikes. That is pretty much how backing up data often works. Read More

WHITE PAPER: Implementing DNSSEC to mitigate financial and brand risks (F5 Networks)
The problems of DNS security have long been known, which is why DNSSEC was developed. However, it is only now that widespread deployment is possible as the internet infrastructure is being readied to accept DNSSEC lookups and tools are available to remove the complexity involved in its deployment. Read now!

Energy research projects were on fire in 2010
From wind and new fuel efficient cars to biofuels and storage systems, energy research project saw million of dollars in 2010 Millions of dollars were laid out this year for all manner of energy research - from new biofuels and wind projects to better batteries and smartgrid cybersecurity programs.  There were other stories too, such as the X Prize Foundation's $10 million Progressive Insurance Automotive X Prize that was finally awarded to three teams who developed super Read More

Crack Your Own Passwords for Better Security
Passwords are the primary key to our digital lives--providing the only barrier preventing sensitive data from being compromised in most cases. IT admins should think and act like a hacker to proactively identify weak passwords, and stay one step ahead of a data breach. Read More

WHITE PAPER: Information Security and Multi-Compliance (Tripwire)
It's common for information security managers to be held responsible for situations where they have little control or influence. This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It's common for information security managers to be held responsible for situations where they have little control or influence. This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and bu

OpenBSD chief believes contractor tried to write backdoors
The lead developer of the OpenBSD operating system says that he believes that a government contracting firm that contributed code to his project "was probably contracted to write backdoors," which would grant secret access to encrypted communications. Read More

CSO resumes: 5 tips to make yours shine
The current challenges in today's job market didn't stop Phillip Mahan from bouncing back quickly after a setback. Mahan was laid off from his position as manager of information security and risk management at Unisource Worldwide in February. By April he was working again as the business information security officer with ING. There is a reason why he wasn't on the job hunt for very long: He is fanatical about his resume and his career. Read More

WEBCAST: Choosing Enterprise Firewall for 2011 & Beyond (Palo Alto Networks)
Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more!

DDoS attacks threaten free speech, says report
Harvard study finds increasing DDoS attacks against human rights, dissident sites without the means to adequately defend themselves. Read More

Man used neighbor's Wi-Fi to threaten Vice President Biden
A Blaine, Minnesota, man has pleaded guilty to charges that he hacked into his neighbor's Wi-Fi connection to e-mail death threats and child pornography, apparently with the intention of causing trouble for the unsuspecting neighbor. Read More

Leveraging Active Directory as your single source for authentication and authorization
As the role of Active Directory evolves and becomes a central component of your infrastructure, consider the following steps to improve your security posture and your ability to facilitate productive business. Read More


FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. U.S. military strong-arming IT industry on IPv6
  2. The weirdest, wackiest and stupidest sci/tech stories of 2010
  3. Researchers reveal attack code for new IE zero-day
  4. Santa Claus placed on watchlist as possible terrorist
  5. Will 2011 be the year of mobile malware?
  6. Have yourself a very Linux Christmas
  7. FCC approves compromise net neutrality rules
  8. U.S. sets out to build photon-based optical networks
  9. HP targets Cisco Catalyst base
  10. 5 reasons to move to Windows 7, plus XP advice

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter



You are currently subscribed to networkworld_security_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment