Search This Blog

Wednesday, April 29, 2009

Swine Flu: How to Make Biz Continuity Plans; McAfee launches 'online 911' for cybercrime victims

15 easy fixes for Mac security risks; New zero-day exploit targets Adobe Reader
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Security Smart Newsletter
rule

Save time and effort on security awareness training
The Security Smart quarterly security awareness newsletter grabs your employees' attention by presenting security topics in a dynamic useful way. You'll save money, time and energy while making your organization Security Smart. View sample issues and subscribe today! From the editors at CSO Magazine.

rule

Spotlight Story

Swine Flu: How to Make Biz Continuity Plans
Speaking at the annual conference of The National Academy of Sciences Monday, President Obama said that declaring the swine flu outbreak a national health emergency was a prudent measure and no reason for panic. He's getting regular updates and briefings from John Brennan, assistant to the president for homeland security and counterterrorism; Dr. Richard Besser, acting director of the Centers for Disease Control and Prevention; and Janet Napolitano, secretary of homeland security.
Also see:
Swine flu threat raises telework questions
Cisco, HP telepresence and swine flu
Spammers seize on swine flu to pitch bogus meds
Swine Flu Spreads via Twitter
Swine flu: What did we learn from bird flu planning

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

McAfee launches 'online 911' for cybercrime victims McAfee has launched a new Web site designed to help cybercrime victims recover from hacker attacks.

15 easy fixes for Mac security risks One of the commonly touted advantages to using a Mac is that it's more secure and less prone to malware than a PC running Windows. It's easy to see where this attitude comes from: The prevalence of viruses and network attacks against Windows machines is greater by several orders of magnitude.

BitLocker, TPM won't defend all PCs against VBootkit 2.0 Trusted Platform Modules and BitLocker Drive Encryption can protect Windows 7 computers against a bootkit attack unveiled last week but these technologies won't be available on a large portion of computers, leaving millions of users unprotected when Microsoft releases its next version of Windows.

New zero-day exploit targets Adobe Reader Adobe Systems Tuesday confirmed that it's investigating reports that its popular PDF viewing software, Adobe Reader, contains a critical vulnerability.

Identifying the source of corporate threats The Verizon Business RISK team recently released its "2009 Data Breach Investigations Report," which gives a fresh look into the question of whether insiders or outsiders are the larger threat group. The report concludes that 74% of breaches result from external sources and "the predominance of total records lost was attributed to outsiders."

Cloud computing security: Who knew? Bradner: Security has not been much of a consideration in cloud computing - but that may be about to change.

Mozilla re-patches Firefox after regression bug pops up Mozilla Monday rushed out a new version of Firefox to fix a flaw it introduced with the 12-patch security update it shipped less than a week ago.

Free, cheap and pricey privacy-information services A top affliction of privacy professionals is the growing complexity of privacy laws. The number of jurisdictions regulating data privacy and the number of other laws in which privacy provisions are tucked has increased with no letup since 2000. Like the Lilliputians in Gulliver's Travels, the tiniest jurisdictions are now lassoing their privacy ropes around the mightiest of corporations.

How to Keep Intrusion Detection From Sucking Cisco Subnet blogger Jimmy Ray Purser says intrusion-prevention/detection system is like the plastic worm of network security devices in today's more advanced botnet orientated world. Read on to find out what he means.

Windows 7 and Server 2008 R2 Bring Us DNSSEC. Will We Use It? Microsoft Subnet bloger Mitchell Ashley says a technology that's been around a while is finally getting its due, and deservedly so... DNSSEC, thanks to Dan Kaminsky's Blackhat presentation last year.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Security Smart Newsletter
rule

Save time and effort on security awareness training
The Security Smart quarterly security awareness newsletter grabs your employees' attention by presenting security topics in a dynamic useful way. You'll save money, time and energy while making your organization Security Smart. View sample issues and subscribe today! From the editors at CSO Magazine.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

04/29/09

Today's most-read stories:

  1. Military enlists open source community
  2. Seven burning security questions
  3. How Bluetooth got as fast as Wi-Fi
  4. BizTalk Server 2009 ready for the public
  5. Some IT skills see pay hikes during downturn
  6. JTAG Hacking
  7. 12 killer freebie SharePoint add-ons
  8. IBM to resell Brocade's Foundry switches
  9. The biggest losers in the Oracle, Sun deal
  10. The downfall of Sun
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



1 comment:

Anonymous said...

I know this site offers quality deρending articles or rеνiеws and otheг stuff, is there anу other web site which
рrοvideѕ such stuff in quality?


my ѕitе; payday loans