Search This Blog

Monday, February 07, 2011

Microsoft to patch 22 bugs, 3 zero-days next week

U.S. sacks counterfeiters in massive sting | Can 'encrypted blobs' help with secure cloud computing?

Network World Security

Forward this to a Friend >>>


Microsoft to patch 22 bugs, 3 zero-days next week
Microsoft today said it will issue 12 security updates next week to patch 22 vulnerabilities in IE, Windows, its Internet server and Visio, the company's data diagramming tool. Read More


RESOURCE COMPLIMENTS OF: St. Bernard, now doing business as EdgeWave

Spend Less on Email Security, Earn $15 GC
Next-gen Email Security finds emerging email threats first, with our proprietary Zero Minute Defense TM- no one else has it. Protect your business-critical email and your network. We'll try to match the cost of your current solution, or any competitive offer you have. You'll earn cash just for checking us out. Click here for the EdgeWave Bid Desk.

WEBCAST: Palo Alto Networks

Choosing Enterprise Firewall for 2011 & Beyond
Firewalls are evolving. Application visibility and control has made its way to the forefront of the requirements list for enterprise firewalls. We are dedicating this episode of 60 Minutes with Nir Zuk to the more practical considerations around choosing an enterprise firewall. Learn more!

U.S. sacks counterfeiters in massive sting
With the National Football League's Super Bowl extravaganza as a background, the government announced what it called a record breaking $3.6 million sting aimed at counterfeit game-related sportswear sellers. The U.S. Immigration and Customs Enforcement (ICE) worked with multiple NFL teams and various law enforcement agencies throughout the nation to identify stores and vendors selling counterfeit trademarked items, ICE stated. Read More

Can 'encrypted blobs' help with secure cloud computing?
Can cloud-based computing be made more secure in the future using what crypto geeks call "fully homomorphic encryption" to send data as "encrypted blobs" that can be understood and subject to processing without having to actually de-crypt them first to see the plaintext? Read More

Pwn2Own organizer predicts Chrome will survive first day
Google's Chrome will likely survive the first day at next month's Pwn2Own hacking challenge, but may fall the next when the rules change, the contest organizer predicted. Read More

Reader X spoils new PDF attack
Adobe's Reader X, last year's upgrade that features a "sandbox" designed to protect users from PDF exploits, stymied a recent attack campaign, researchers said. Read More


WHITE PAPER: PacketMotion

PacketMotion and Sox IT Controls
PacketMotion's PacketSentry solution for User Activity Management and how it allows companies to comply with SOX quickly, efficiently, and without risking application availability. Read now!

Google fixes 9 bugs in Chrome, including sandbox-escape flaw
Google on Thursday patched nine bugs in Chrome and upgraded the most stable edition of the browser to version 9. Read More

Cisco announces three new security certifications
It's Cisco Live this week - in London, at least. As usual, Cisco announced new certifications, this time all of them in security. Read More

Microsoft fixes cookie security bug in Windows Azure
Microsoft fixes a security bug in Windows Azure, and offers a new "extra small" cloud computing instance. Read More

SpiderLabs' top strategic security initiatives for every organization in 2011
SpiderLabs, the advanced security team within the consulting firm Trustwave, has just released its Global Security Report of 2011.  The report is based on more than 220 incident response investigations and 2,000 manual penetration tests conducted by in the past year.  Nicholas Percoco of SpiderLabs shares his top "eleven for '11" security initiatives that every organization should undertake in order to reduce the risk of a costly security breach. Read More


WHITE PAPER: Tripwire

Meeting the True intent of File Integrity Monitoring
Today, organizations simply use file integrity monitoring (FIM) to meet one of the many regulations, like PCI, that require it. But for most, the term "FIM" has become synonymous with "noise" due to the volume of change data it indiscriminately produces. Learn what true FIM is, and why it's still critical for security and compliance. Read now!

DARPA offers up $10,000 challenge for new military fighting vehicle
Can you design a tank? Well you could win $10,000Ok so it may not be a tank, but the scientists at the Defense Advanced Research Projects Agency (DARPA) today issued a $10,000 to design a next-generation military fighting vehicle. Read More

Watching for space junk: Space fence takes shape
US Air Force awards $214M contracts to begin Space Fence developmentAs expected the Air Force recently handed out two $107 million checks to begin development of the advanced radar system known as the Space Fence it will deploy to protect detect objects in low and medium earth orbit that might strike Earth Read More

What a girl wants: 25 techie gifts for your Valentine
There's still plenty of time to shop for your Valentine, and you don't even have to leave your desk to buy one of these 25 tech-inspired gifts. Read More

Modems: 60 Years of Hooking Up
A visual guide to the history of the modem, from the 1950s to today. Read More

15 more useful Cisco sites
Everything you want to know about Cisco routers, security, consumer electronics and more Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. Want a new IT job? Now's your chance
  2. Watchdog group questions Google's relationship with NSA
  3. Cisco announces three new security certifications
  4. GoDaddy isn't as pretty as you thought
  5. Microsoft bolts HTML5 video onto Chrome for Windows 7 users
  6. Red Hat defends Microsoft in i4i patent dispute
  7. Android: We're number one!
  8. No more IPv4 addresses
  9. Super technologies that will change the face of football
  10. 15 more useful Cisco sites

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: