Search This Blog

Monday, December 12, 2011

Security roundup: Lockheed Martin sounds alarm on Adobe Reader zero-day; Microsoft patchfest coming

Court dismisses most breach claims against Heartland by banks | 43rd anniversary of the "mother of all demos," first mouse

Network World Security

Forward this to a Friend >>>


Security roundup: Lockheed Martin sounds alarm on Adobe Reader zero-day; Microsoft patchfest coming
When Adobe last week issued an advisory about a dangerous zero-day attack based on an unpatched Adobe Reader vulnerability that was being exploited in the wild to try and seize control of both PCs and Macs, it credited Lockheed Martin for sounding the alarm about it. Read More


WHITE PAPER: FireEye

Attacks get through 95% of networks
Advanced Malware Exposed is a 20+ page ebook providing a broad overview on the major aspects of advanced malware, its underpinnings, its impact on modern business practices, and briefly suggests possible solutions. Read now!

RESOURCE COMPLIMENTS OF: Palo Alto Networks

10 Things Your Next Firewall Must Do
Choosing a next-generation firewall is more than a simple comparison of technical features. It's about balancing the needs of the business with the risks associated with modern applications. Gain access to valuable information in one location- read articles and watch videos that will empower you to make the right decision. Learn More!

Court dismisses most breach claims against Heartland by banks
A U.S. district court in Texas has dismissed all but one of the claims by several banks against Heartland Payment Systems over a massive data breach the payment processor disclosed almost three years ago. Read More

43rd anniversary of the "mother of all demos," first mouse
It has been dubbed the "Mother of all demos" but it was way more than that. On December 9, 1968 Douglas Engelbart stepped to the podium at what was called the Fall Joint Computer Conference in San Francisco and showed off the world's first mouse, but also introduced hypertext links, on-screen text editing, video teleconferencing, windowing and a variety of other computing concepts years Read More

Anonymous attack on HBGary Federal didn't ruin us, says CEO
When HBGary Federal, had its website hacked and sensitive e-mail exposed by hacktivist group Anonymous last February, it became a question of how Sacramento, Calif.-based security firm HBGary could survive the damage to its reputation. Read More


WHITE PAPER: i365

Trusted Data Assurance in the Cloud
Cloud-based services are here to stay. Cloud services are even more attractive for companies who are being hit with the high cost of meeting compliance requirements - especially for small and mid-size companies that have shrinking or no information security budget. Read now!

Blog: Securing "the" directory
I use the quotation marks around "the" with respect to enterprise directory because there is almost never a single directory in the enterprise. Fifteen years after the first time I remember discussing consolidating onto a single directory (in an IT job where it was actually easy, given the scale of the organization I worked in), the drive to get to a "single source of truth" for identifying... Read More

Small company, big security challenges
Small company, big ambitions. Sounds like the classic entrepreneurial dream--but what if it means you bear the burden of big-company regulatory or standards compliance? Read More

4 Facebook Security Tips to Stay Safe in 2012
Once again, Facebook founder Mark Zuckerberg was hacked. Read More


WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

NASA iPhone, iPad app lets you watch, research meteors
NASA has released a new smartphone app that lets novices and experts alike track, count and record data about sporadic meteors and meteor showers anywhere in the world. Read More

Google, Microsoft teams work to keep pace with privacy laws
Executives from Microsoft and Google on Thursday gave a glimpse into the size of their privacy organizations, which are required for the companies to try to avoid running foul of complicated U.S. privacy regulations and prepare for changes coming to privacy laws around the globe. Read More

Two zero-day vulnerabilities found in Flash Player
Two newly discovered vulnerabilities in Adobe's Flash Player can be exploited to execute arbitrary code remotely, according to advisories from the U.S. Computer Emergency Readiness Team (US-CERT) and various security research companies. Read More

Google's Schmidt calls Carrier IQ software a keylogger
Google Executive Chairman Eric Schmidt today distanced his company from Carrier IQ's software, even as he described the technology as a keylogger. Schmidt's comments came at an Internet freedom conference in the Netherlands. Read More



SLIDESHOWS

25 free open source projects IT pros will love
We asked SourceForge's new community manager and longtime open source coder, Rich Bowen, to sniff out a few of the cool, lesser-known projects he thinks IT folks will love. What follows are his picks, along with a few of our own.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Microsoft plans 20 patches next week
  2. Cisco storms back in switching
  3. How dangerous are Facebook, Twitter and search engines
  4. The worst web design mistakes, and how to prevent them
  5. 10 most powerful cloud companies
  6. Padlock salesman trades 30-pound sample case for 1.35-pound iPad
  7. Microsoft: We can remotely delete Windows 8 apps
  8. What's really going on with Carrier IQ on your phone
  9. Kindle Fire likely to be a hit despite middling reviews
  10. CNET accused of wrapping malware in Windows installer for Nmap security tool

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: