Search This Blog

Monday, April 29, 2013

Vulnerable terminal servers reflect bigger security problem

McAfee spots Adobe Reader PDF-tracking flaw | Hackers increasingly target shared Web hosting servers for use in mass phishing attacks

Network World Security

Forward this to a Friend >>>


Vulnerable terminal servers reflect bigger security problem
Security weaknesses uncovered in terminal servers used to provide an Internet connection to a wide variety of business and industrial equipment exemplify the risk inherent in adapting older systems to modern technology, experts say. Read More


WHITE PAPER: Dell

The Importance of Managing Privileged Accounts
Organizations can benefit greatly with a robust process for the proper use, management and enforcement of administrative privileges. Read this white paper to learn a balanced and enforceable approach for ensuring effective security, compliance and daily operations. Read Now!

WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

McAfee spots Adobe Reader PDF-tracking flaw
McAfee said it has found a vulnerability in Adobe Systems' Reader program that reveals when and where a PDF document is opened. Read More


WHITE PAPER: Tripwire

10 Steps to Risk-based Security Management
Many professionals in information security espouse the belief—and commitment to—"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Learn More

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks
Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG). Read More


WEBCAST: VCE

Vblock Specialized System for SAP HANA
Overview video from DJ Long about the new Vblock Specialized System for SAP HANA. Learn More.

LivingSocial gets hacked, 50 million users told to reset passwords
More than 50 million users of the daily deals site LivingSocial are being asked to reset their passwords after hackers attacked the company's servers and potentially made off with personal data. Read More

25 must-have technologies for SMBs
Running a small business isn't easy. I know. I run one. As a freelance writer, I've learned that you need to run your writing career as if you were running a business. Read More

Locked and loaded, online gamers draw phishing attackers
Online gamers have become rich targets for cybercriminals, according a report released this week by the Anti Phishing Work Group. Read More



SLIDESHOWS

25 weirdest things in the 'Internet of Things'

The Internet is slowly creeping into every part of our lives, so much so that it's becoming easier to look around the house and find objects that can be connected to the Internet.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. A vendor-independent comparison of NoSQL databases

2. Will we see Key Lime Pie at Google I/O after all?

3. Windows 8 update: Transition from Android to Windows Phone made easier

10. SDN market about to explode

9. Apple's Cook resets 3 popular, and wrong, Apple rumors

6. DHS use of deep packet inspection technology raises serious privacy questions

5. Apple WWDC sells out in 2 minutes, first tickets on eBay less than 1 hour later

4. Extreme Networks replaces its CEO again

7. Top 10 programming skills that will get you hired

8. Cisco nemesis: Huawei retreating from the U.S.


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: