Search This Blog

Wednesday, February 23, 2011

Zeus trojan is back and targeting Windows Mobile phones

Memory scraping malware goes after encrypted private information | Dumbest tech marketing stunts of all time

Network World Security

Forward this to a Friend >>>


Zeus trojan is back and targeting Windows Mobile phones
2011 likely to be a big year for smartphone security as black hats, and white hats, turn their attention to it.A new variant of the Zeus trojan has surfaced and it's targeting Windows Mobile phones. In September a variant was discovered that targeted Symbian and BlackBerry phones. Read More


WHITE PAPER: St. Bernard Software

Compare Web Filters, Enter to win an iPad
View this demo of iPrism Web Filter and learn why throughput speeds of up to 100+ Mbps, anti-virus protection, and seamless Active Directory/Terminal Services integration and reporting included at no charge has made iPrism the appliance-based choice for organizations of all sizes. Learn More

RESOURCE COMPLIMENTS OF: Hitachi Data Systems

Hitachi IT Operations Analyzer
Pinpoint root cause of network issues up to 90% faster. Automated Root Cause Analysis speeds remediation. FREE video and 30-day trial. Download free 30-day trial

Memory scraping malware goes after encrypted private information
What's "pervasive memory scraping" and why is it considered by SANS Institute security researchers to be among the most dangerous attack techniques likely to be used in coming the coming year? Read More

Dumbest tech marketing stunts of all time
Two Dell employees last week put the maxim "There's no such thing as bad publicity" to the test after a hostage-themed marketing stunt focused on the Dell Streak tablet went about as badly as you'd expect. Read More

Kindsight Blends Security with Targeted Behavioral Ads
Interview with Kindsight which offers free or paid versions of security services. The free service uses DPI to examine consumers' Internet traffic and then serves up targeted behavioral ads.In a previous post about exploiting deep packet inspection (DPI) surveillance services for marketing, one of the companies we looked at was Kindsight. Deep Packet Inspection (DPI) involves the use of network equipment to intercept, examine, modify, restrict, or copy the content of data communications on the fly. Read More


WHITE PAPER: VeriSign

DNSSEC: The Hows and Whys of Implementation
Security vulnerabilities are changing the nature of the Internet. Individuals and companies are at risk of cache poisoning and man-in-the-middle attacks. That's why the Domain Name System SecurityExtensions (DNSSEC) are critical toward ensuring adequate protection. Read Now

Smartphone Security Threats Overdramatized, Experts Say
I was sitting in the middle of one of the most security conscious crowds you'd ever come across--about 200 computer security professionals listening to a high-powered panel on mobile security threats at the RSA Conference in San Francisco last week. Read More

How to secure Web applications from insecure mobile devices
RSA says 2011 will be the year of mobile device malware and of criminals exploiting these devices to commit fraud and other crimes. With literally billions of devices in use worldwide, it's hard to secure them all. Trusteer takes a different approach: secure the applications people want to access from these mobile devices. The solution involves a secure Web browser on a gateway that the mobile device must use to access the protected application. Read More

10 Great Error Messages
A good computing day is an error-free day. Unfortunately, those are rarer than we would like. Have you seen any of these funny and original error messages lately? Read More


WHITE PAPER: Polycom

NDS thrives with Microsoft-optimized Polycom Solutions
Read how NDS Group Lte.'s success in implementing a Unified Collaboration platform based on Microsoft Lync 2010 and Microsoft-optimized Polycom telephony, improved employee productivity, reduced costs and streamlined communications. Read More

Disaster recovery trial by fire... literally
On a Sunday morning last year, John Brooks received news no one wants to hear. There'd been an electrical fire in the basement of a New York City office tower - where his law firm has an office. Read More

Can't industry and government 'just get along' for IT security?
RSA panel urges joint solution to guard against cyberwarI noted with interest the "Cyberwar Panel" session at the RSA Conference 2011 just concluded in San Francsco and knew I had to add it to my calendar. A similar panel at the 2010 conference drew a big audience and a robust debate about it in comments here to that post a year ago. Read More

Secruity bigwigs want more government involvment in cyber security
Schneier, McConnell, Chertoff urge joint solution to guard against cyberwar during RSA panelI noted with interest the "Cyberwar Panel" session at the RSA Conference 2011 just concluded in San Francsco and knew I had to add it to my calendar. A similar panel at the 2010 conference drew a big audience and a robust debate about it in comments here to that post a year ago. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. Anonymous: It's a trap!
  2. Mobile heavyweights seek to finalize 1Gbps mobile standard
  3. The iPad data dilemma: Where cloud storage can help
  4. iPad could get Intel's superfast Light Peak connector
  5. Disk or tape? How about both
  6. How IT pros cheat on certification exams
  7. Cerf: Future of Internet doesn't include an IPv7
  8. Cisco grapples with transition as routers and switches lag
  9. Cisco's moment of truth
  10. Why you freak out over Facebook

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: