Tuesday, August 30, 2011

New Windows worm spreads by attacking weak passwords

  Browsing and Privacy: How to Not Get Tracked | 5 misconceptions about file transfer security
 
  Network World Security

Forward this to a Friend >>>


New Windows worm spreads by attacking weak passwords
A new Windows worm is working its way through company networks by taking advantage of weak passwords, security researchers said over the weekend. Read More


WEBCAST: Akamai Technologies, Inc.

Saving cloud computing users from evil doers
This video panel discussion delves into IT's current and future security threats. Topics include web application security, vulnerabilities, threats and mitigation/defense strategies, and tactics with individual perspectives on the magnitude and direction of threats. Learn more

WHITE PAPER: IBM

Realize More Business Value
Read the white paper and learn how IBM Tivoli® Security Management for z/OS® can safeguard your business—and deliver rapid ROI. Read Now

Browsing and Privacy: How to Not Get Tracked
All modern browsers have built-in tools and add-ons to protect users from having their Web behavior tracked. But regardless, some sites still find ways to track you. Here are tips for taking matters into your own hands. Read More

5 misconceptions about file transfer security
The typical enterprise transfers thousands of files per day, making it one of the essential business productivity tools. But there are a number of file transfer security misconceptions floating around that give the technology a black eye. Here are the Top 5. Read More


WEBCAST: BMC

Simplify, Improve, and Save with Dynamic Workload Management
Join us in our conversation with John McKenny, BMC vice president of Worldwide Marketing for Mainframe Service Management (MSM), as we uncover the advantages of dynamic workload management. Learn More!

NASA, DARPA set aside $500,000 for private, long-distance space travel project
On paper anyway the 100 Year Starship - now with its own acronym, 100YSS -- project could be one of the most ambitious space developments ever attempted. Read More

Survey: IT pros split on allowing end users to download, install software
In their efforts to keep malware off their networks, some IT and security pros restrict end users' rights to install apps on company machines, and the majority restrict the individual applications that are allowed on the network, a survey says. Read More


WHITE PAPER: Akamai Technologies, Inc.

Taming the Cloud
This whitepaper explores the components of the cloud computing ecosystem, demonstrates how Akamai is delivering services for cloud optimization, and looks forward into the evolution of this dynamic and growing market. Read now

In just three weeks, Facebook pays out $40K to hackers
Three weeks after launching a bug bounty program that pays Web hackers cash for finding flaws with its website, Facebook said it has paid out more than US$40,000 in rewards. Read More

Scariest IPv6 attack scenarios
Experts are reporting a rise in the number of attacks that take advantage of known vulnerabilities of IPv6, a next-generation addressing scheme that is being adopted across the Internet. IPv6 replaces the Internet's main communications protocol, which is known as IPv4. Read More

Windows Servers & Workstations Vulnerable to Wicked Worm in the Wild
Like a blast from the past, there's a wicked worm spreading in the wild. Morto, the 'death' worm exploits weak passwords to hijack fully-patched Windows servers and workstations via Remote Desktop Protocol (RDP) . Once Morto discovers a Remote Desktop connection, it tries a list of weak passwords to login as Administrator. Then it attempts to terminates anti-virus and popular security-related programs.... Read More

 
 
 

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

MOST-READ STORIES

  1. Distracted to death (Jennifer Aniston naked)
  2. iPhone 5 rumor rollup for the week ending Aug. 26
  3. Google to shut down Slide social apps
  4. Was this the email that took down RSA?
  5. Scariest IPv6 attack scenarios
  6. 7 ways to use HP TouchPads after they stop working
  7. What do top CIOs make?
  8. MIT researchers craft defense against wireless attacks
  9. Best networking tweaks for Windows Server, Vista and SP
  10. Silver Peak unveils free WAN acceleration product
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment