Search This Blog

Friday, September 02, 2011

Death by Morto A? It's your own fault, says Microsoft

  Was this the e-mail that took down RSA? | VMworld: Security, regulatory concerns still a challenge in virtualization
 
  Network World Compliance

Forward this to a Friend >>>


Death by Morto A? It's your own fault, says Microsoft
The Morto A worm is having continued success despite its reliance on a list of lame passwords to take over victim machines. Read More


WHITE PAPER: Quest Software

New NetVault Backup Licensing Model
Read a report from an industry-leading analyst to see why traditional backup and recovery licensing methods no longer make sense. You'll learn how you can dramatically cut costs with a different strategy that's more intuitive, reasonable, enduring, and flexible. Download the report today. Read Now!

WHITE PAPER: Citrix Systems

Gartner 2011 Planning Guide: Network and Telecom
Read the Gartner Research Note, "2011 Planning Guide: Network and Telecom," and discover how to keep up with the most important networking trends for 2011. Includes practical guidance to build an optimized data center, the best network infrastructure and true "anywhere Enterprise" capabilities. Get your report -- compliments of Citrix. Learn more

Was this the e-mail that took down RSA?
"I forward this file to you for review. Please open and view it." Read More

VMworld: Security, regulatory concerns still a challenge in virtualization
While VMware users harbor little doubt about the cost savings and productivity gains brought by virtualizing their networks, security concerns still exist on many fronts, whether it's figuring out how to meet regulatory compliance with auditors, or evaluating cloud services. Read More

5 misconceptions about file transfer security
The typical enterprise transfers thousands of files per day, making it one of the essential business productivity tools. But there are a number of file transfer security misconceptions floating around that give the technology a black eye. Here are the Top 5. Read More

Tips for Taming Rogue IT
Sure, some rogue IT is the result of unmet technology needs. Other times, it's just the product of misunderstanding or miscommunication. Read More


WHITE PAPER: Diskeeper Corporation

Diskeeper 2011 Professional Edition FREE Trial
Diskeeper prevents the majority of fragmentation (scattered file fragments randomly placed across the hard drive) before it can happen and instantly defrags the rest. More importantly, Diskeeper 2011 brings data flow up to peak speed for the best possible productivity. Download now!

Chatbots gone wild – and nasty
A demo of two robots chatting that a pair of Cornell University Ph.D. students cobbled together for an artificial intelligence course has exploded into a viral video over the past week that has amassed nearly 1.4 million views on YouTube. The video, "AI vs. AI. Two chatbots talking to each other" (see below) is based on a Web-based chatbot called Cleverbot that the students gussied up with a text-to-speech... Read More

Top cybersecurity concerns: Malicious code, employees run amok
When 3,300 information-technology professionals were asked about cybersecurity, they said malicious code attacks accounted for the main type of cyberattack their organizations suffered during the past year, although "internal unintentional actions" by well-meaning insiders also wreaked havoc. Read More

4 simple steps to bulletproof laptop security
Follow these tips, tools, and techniques to protect your Windows notebook against theft, intrusion, and data loss Read More

VMware strives to expand security partner ecosystem
VMware yesterday said it has added more security vendor partners to its vShield product-development program in which security firms work with the company to develop data protection specifically designed for VMware's flagship virtualization platform, which today is vSphere 5.0. Read More


WHITE PAPER: CA Technologies

The Most Important Metric for your VMs
The management tools selected to support virtualization is essential to the ability of IT to grow the virtual environment without proportionately increasing the staff to manage all of the new physical host servers and their guest VMs. Learn More

Hackers may have stolen over 200 SSL certificates
Hackers may have obtained more than 200 digital certificates from a Dutch company after breaking into its network, including ones for Mozilla, Yahoo and the Tor project, a security researcher reported today. Read More

Hackers break into Linux source code site
As Linux fans know, there are two kinds of hackers: the good guys who develop free software, such as the Linux kernel, and the bad guys who break into computers. Read More

Trend Micro: Virtualization changing our anti-malware business big time
Virtualization -- in particular Trend Micro's close alliance with VMware -- is bringing about a strategic shift in Trend's anti-malware business as its products become designed for use with VMware's vShield technology. Read More

Survey: IT pros split on allowing end users to download, install software
In their efforts to keep malware off their networks, some IT and security pros restrict end users' rights to install apps on company machines, and the majority restrict the individual applications that are allowed on the network, a survey says. Read More

The big, bad browser quiz
Internet Explorer, Firefox, Chrome, Safari -- you know the names of these Web browsers, but do you really know them? Read More

IFA: Sony intros two Android tablets
The tablets will integrate with other Sony products so for example consumers can use them as a remote control for their TV. Read More

 
 
 

SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. Thinnest material in the world could boost Internet speeds tenfold-plus
  2. Microsoft's 5 biggest weaknesses
  3. Apple reportedly on another lost iPhone scavenger hunt
  4. 'You are an idiot' if you don't give back to open source
  5. Feds move to block AT&T-T-Mobile merger
  6. Microsoft claims its private cloud is up to four times cheaper than VMware's
  7. Will climate engineering ever be ready for prime time?
  8. 4 simple steps to bulletproof laptop security
  9. Cisco, VMware expand collaboration
  10. Hackers break into Linux source code site
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: