Search This Blog

Tuesday, February 01, 2011

How to protect Windows from the new MHTML zero-day hole

Kaspersky vows anti-virus products are safe despite source-code theft | As IPv4 disappears, transition poses hazards

Network World Security

Forward this to a Friend >>>


How to protect Windows from the new MHTML zero-day hole
Turning off the MHTML protocol will offer protection and break little, Microsoft advisesOn Friday, Microsoft warned of a new zero-day bug affecting all versions of Windows that could allow remote code execution if users clicked on malicious links. It also released some guidance on how to determine if your Windows machines are vulnerable and how to turn off MHTML, the offending protocol that allows the attack. Read More


RESOURCE COMPLIMENTS OF: St. Bernard, now doing business as EdgeWave

Spend Less on Email Security, Earn $15 GC
Next-gen Email Security finds emerging email threats first, with our proprietary Zero Minute Defense TM- no one else has it. Protect your business-critical email and your network. We'll try to match the cost of your current solution, or any competitive offer you have. You'll earn cash just for checking us out. Click here for the EdgeWave Bid Desk.

WHITE PAPER: Qwest

Why IT Leaders Aren't Scared of Cloud Security
Examine this CIO report in which your peers offer advice on cloud services and data protection. Learn 3 key tips for taking the right approach to securing a hybrid cloud infrastructure to dispel any data doubts. Read now!

Kaspersky vows anti-virus products are safe despite source-code theft
Kasperesky Lab says the anti-virus source code that one of its employees stole three years ago and distributed online cannot harm customers of the company's current products. Read More

As IPv4 disappears, transition poses hazards
With the last IPv4 addresses about to be allocated, the good news is that IT managers -- at least in the U.S. and Europe -- don't suddenly have to get the next Internet Protocol working. Read More


WHITE PAPER: Tripwire

Information Security and Multi-Compliance
It's common for information security managers to be held responsible for situations where they have little control or influence. This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. Read now!

5 New Online Security Threats to Avoid
Hackers just keep devising new ways to target Facebook and Amazon.com users. Read up on these five threats before you're "spear phished" - or worse. Read More

Intelligent system would let spent rockets land on a ship
Jeff Bezos' Blue Origin patent wants rockets to land on boat rather than splashing downThe logistics sound ambitious but an eye-catching patent made public today defines an intelligent boat that would be sent out on the ocean to catch spent rockets that have delivered payloads to space and are returning to Earth. Read More


WHITE PAPER: Websense, Inc.

Bailing Out Your Budget: How to Lower Your TCO
The Websense® TRITON™ solution is a unified content security solution that not only delivers better protection against modern threats but also does so with the lowest total cost of ownership (TCO). Read More

SaaS, PaaS, and IaaS: A security checklist for cloud models
How does security apply to Cloud Computing? In this article, we address this question by listing the five top security challenges for Cloud Computing, and examine some of the solutions to ensure secure Cloud Computing. Read More

Cost of regulatory security compliance? On average, $3.5M
The cost of achieving regulatory security compliance is on average $3.5 million each year, according to a survey of 160 individuals leading the IT, privacy and audit efforts at 46 multinational organizations. Read More

Security firm 'detonates' copies of suspicious files to sniff out malware, botnet attacks
HBGary Monday introduced an appliance that sits at the perimeter of the enterprise network to watch for possible incoming malware and outgoing traces of botnet infections. Read More

How to manage consumer devices on your network
Your user community is connecting to your corporate email system using all kinds of consumer devices, from iPhones to iPads and Android-based smart phones. Do you know what devices are coming into the network? Do you know what applications are on these devices? Do you have any means to control them, preferably based on your standard policies? Fiberlink Communications has new Mobile Device Management services that can help. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

Panic time quiz: How prepared are you for IPv6?
With IPv4 addresses projected to dry up this year, it's inevitable that IPv6 adoption will accelerate. Here are a few questions that can help determine how much or how little you know about IPv6 and whether you ought to spend more time studying it.

The Mac App Store's hottest productivity apps
The Mac App Store debuted this month and hit 1 million downloads in the first 24 hours. The App Store launched with 1,000 or so apps, many of which were already available on the pre-existing Mac downloads Web site. The store is filled with stuff that's fun but also has plenty of apps that make you more productive. Let's take a look at the 10 most downloaded free productivity apps on the Mac App Store, and then we'll look at the 10 most popular paid productivity apps.

MOST-READ STORIES

  1. Microsoft warns of new Windows zero-day bug
  2. Open-source challenge to Microsoft Exchange gains steam
  3. Old-school tech steps to the forefront in Egypt
  4. Anatomy of an Internet blackout
  5. IPv4 addresses: Going, going, g...
  6. When the CEO gives iPads to all: One CIO's story
  7. Hackers turn back the clock with Telnet attacks
  8. 20 weird and wacky products for Android fans
  9. Egypt: Cisco and Juniper won't go there
  10. Gartner slams Cisco's single-vendor network vision

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: