Search This Blog

Thursday, May 20, 2010

FTC takes out notorious porn- and botnet-spewing ISP

The Future of Endpoint Security | US looking for technology to quash malicious insider threats

Network World Security

Forward this to a Friend >>>


FTC takes out notorious porn- and botnet-spewing ISP
The Federal Trade Commission today got a judge to effectively kill off  the Internet Service Provider 3FN who the agency said specialized in spam, porn, botnets, phishing and all manner of malicious Web content.  Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

The Future of Endpoint Security
If you do some research on endpoint security you'll quickly read one analyst or another's claim that antivirus software is dead and that there is a pressing need for some new model like cloud security services, white listing, black listing, virtual desktops, etc. Antivirus is dead? Hmm, I wonder if these analysts have been following the financial results of Kaspersky, McAfee, Symantec, Trend... Read More

US looking for technology to quash malicious insider threats
Because so-called trusted insiders are a massive threat to the security of corporate and military resources, it may take an industrial strength technology to mitigate the issue.  Read More

Microsoft warns of bug in 64-bit Windows 7
Microsoft today warned users of a vulnerability in the 64-bit versions of Wndows 7 and Windows Server 2008 R2 that could be used to hijack systems. Read More


WHITE PAPER: Adobe

Close the Web 2.0 Communications Gap
Web 2.0 tools have yet to reach critical mass and broad user adoption. This Forrester report identifies the key Web 2.0 gaps and offers advice to: Build a framework that extends email, Upgrade document-based data collection, and Improve email and document exchange security. Read More

Facebook fixing embarrassing privacy bug
Facebook is fixing a Web programming bug that could have allowed hackers to alter profile pages or make restricted information public. Read More

Nanotech will be focus for future criminal hackers
Criminal hackers once rejoiced in manipulating the new digital phone systems in the 1960s and 1970s; then they moved on to using modems and hacking into mainframes in the 1970s and 1980s; then they exploited the new local area network technology and the burgeoning Internet in the 1980s. Malware writers moved from boot-sector viruses on floppy disks in the 1980s to file-infector viruses and then to macro viruses in the 1990s and vigorously exploited worms and Trojans for botnets in the recent decade. [See "Brief History of Computer Crime".] Read More

Cloud-based identity management gets a boost
Giving network managers a way to provide access, single sign-on and provisioning controls in cloud-computing environments got a boost today from both Novell and a much smaller competitor, start-up Symplified. Read More


WHITE PAPER: Fluke Networks

Troubleshooting Application Problems
This comprehensive 94 page guide is a how-to resource handbook for network engineers. Learn the fundamentals of how applications work, how they flow, where applications fail and best practices and methodologies for troubleshooting network and application problems. Click here!

Google Wi-Fi Data Snooping: An FAQ
Google is cleaning up its mess after the company says it mistakenly collecting browsing data from unencrypted Wi-Fi networks as part of its Street View project. The search giant said on Monday that it had deleted all Wi-Fi data collected in Ireland at the request of the Irish Data Protection Authority. The destruction of incorrectly obtained data in Ireland was confirmed by iSec Patners Inc., an independent security consulting firm. Read More

LifeLock CEO said to be victim of identity theft 13 times
A CEO who publicly posted his Social Security number on billboards and TV commercials as part of a campaign to promote his company's credit monitoring services was the victim of identity theft at least 13 times, a news report says. Read More

Symantec to buy VeriSign's security unit for $1.3B, reports say
Security vendor Symantec Corp. is reported to be close to buying Internet infrastructure services vendor VeriSign Inc.s security business for $1.3 billion. Read More

AusCert 2010: Siloed security leaves departments defaced
The Federal Government should centralise control of IT across agencies and departments to ward-off hackers, according to a US state information security expert. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Black duck eggs and other secrets of Chinese hackers
  2. I could license you to use this software, but then I'd have to kill you
  3. 8 in 10 browsers leave identifiable 'fingerprints,' EFF warns
  4. USB worm named biggest PC threat
  5. VA disconnects Sprint's voice, data services
  6. Sun's stars: Where are they now?
  7. Cisco buys Moto -- no, not that Moto
  8. Facebook users warned of sexy 'Candid camera prank' attack
  9. EFF: Forget cookies, your browser has fingerprints
  10. Microsoft counters Gmail with Hotmail overhaul

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: