Thursday, January 17, 2013

Microsoft takes urgent step to patch stubborn Internet Explorer flaw

  Post-patch, US-CERT continues call to disable Java plug-in | Important SCADA systems secured using weak logins, researchers find
 
  Network World Security

Forward this to a Friend >>>


Microsoft takes urgent step to patch stubborn Internet Explorer flaw
Look today for a Microsoft patch that repairs a vulnerability in old versions of Internet Explorer that have been exploited in the wild and that persisted despite a Fix It tool issued last month. Read More


RESOURCE COMPLIMENTS OF: Palo Alto Networks

Learn to Securely Enable Apps in Virtualized Data Centers
Evolve your network security architecture to address today's virtualized data center challenges, and the new application and threat landscape. Get your 'Network Security in Virtualized Data Centers for Dummies' ebook and learn how to adapt your security architecture to address new challenges, and today's application and threat landscape.

WEBCAST: Fluke Networks

Solve QoS Problems in VoIP Call Centers
View this short video "Maintaining High VoIP Quality for Call/Contact Centers with Network Time Machine", to learn more about how carrier and call center customers are using Network Time Machine to rapidly determine problem domain and identify choke points in the network. View Now!

Post-patch, US-CERT continues call to disable Java plug-in
Even though Oracle patched critical Java vulnerabilities on Monday, the U.S. Computer Emergency Readiness Team (US-CERT) is still urging users to disable Java browser plug-ins. Read More

Important SCADA systems secured using weak logins, researchers find
Thousands of critical SCADA systems reachable from the Internet are secured by dangerously weak default passwords, a survey carried out with the help of the US Department of Homeland Security has found. Read More

Verizon worker outsourced part of his job to China so he could have more free time
A number of sources are reporting today that a software developer with Verizon had outsourced part of his job to a company in China so he could have more free time to hit up YouTube, Facebook and other sites. The employee - so far only identified as "Bob", reportedly paid just a fifth of his six-figure salary to a company based in Shenyang to do his job. Read More


WEBCAST: CDW Corporation

The Best Path to SaaS
Cloud computing is here to stay. Software-as-a-Service (SaaS) is particularly popular because it can lower cost while enabling business agility. But not all applications are suited to SaaS. In this Webcast you will learn the best applications for SaaS deployment and how to avoid SaaS pitfalls and cost overruns. Learn More.

Criminals steal 157 smartphones from Londoners every day, police reveal
Criminals in the Britain's capital city are stealing 157 mobile devices every day of the week, an astonishing 79 of which are iPhones, new statistics from London's Metropolitan Police have revealed. Read More

Adobe patches actively exploited ColdFusion vulnerabilities
Adobe released security patches for its ColdFusion application server on Tuesday, addressing four critical vulnerabilities that have been actively exploited by attackers since the beginning of January. Read More

Oracle trying to quell certification exam voucher fraud
Oracle is cracking down on the use of counterfeit vouchers for its certification examinations, a move that could have significant implications for the unwitting as well as willful violators. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

Lucrative Windows crapware market is exactly why we need app stores
Even as Microsoft tries to popularize its Windows Store for PC apps, the market for Windows crapware remains alive and well. Read More

Phys.Org Hacked, serving up malware? Google blocks site, but Bing doesn't
Starting this morning, if you tried to access Phys.org from either Chrome or Firefox, you were greeted with: Firefox also warned of Phys.org being an attack site and blocked access. Read More

Congresswoman proposes amendment to computer fraud law honoring Aaron Swartz
A draft bill to exclude terms of service violations from the Computer Fraud and Abuse Act (CFAA) is to be introduced in the U.S. House of Representatives. Read More

'Rogue clouds' giving IT staffs nightmares
Cloud computing is increasingly being adopted by companies around the world, but IT managers say "rogue cloud implementations" in which business managers sign up for services without getting IT approval is among their biggest challenges. Read More

 
 
 

SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Unlucky Las Vegas man besieged by lost-phone seekers
  2. First look: Facebook's new Graph Search
  3. IBM: Steampunk frenzy to erupt in next two years
  4. Juniper finally talks SDNs
  5. Meet Red October, the latest cyber-spy malware for digital espionage
  6. Oracle releases emergency Java patch; experts warn flaws may take 2 years to fix
  7. Why Windows RT is hurtling toward disaster
  8. Juniper exec gets into nitty-gritty of SDN plan
  9. Free MacBook vending machine dispenses quick computing at Drexel University
  10. 9 essential Internet Explorer 10 add-ons
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment