Search This Blog

Wednesday, September 26, 2012

Inside Microsoft botnet takedowns

Time to disable Java AGAIN: 1 billion at risk from newest critical Java bug | FTC short-circuits privacy-invading computer spy ring

Network World Security

Forward this to a Friend >>>


Inside Microsoft botnet takedowns
When Microsoft took extraordinary steps earlier this month to disrupt the Nitol botnet it was the fifth time its Digital Crimes Unit had taken action against such threats, each time expanding its technical and legal toolkit for making it harder and more expensive to run cybercrime enterprises. Read More


WHITE PAPER: FandoTech

Understanding Recovery vs. Continuance
Understanding the difference between "disaster recovery" and "business continuance" is imperative to finding the right-fit backup, recovery and restoration solution for any organization. Consider the 4 business factors that drive RPO and RTO requirements essential to surviving unplanned outages. Learn more.

WHITE PAPER: Sourcefire, Inc.

The Sourcefire FireAMP Vision
Still getting malware infections despite the time and money you've spent on security? Today's malware defenses have an inherent disadvantage in fighting today's threats. Designed for another time they are burdened with legacy constraints that hamper performance and protection. Learn More

Time to disable Java AGAIN: 1 billion at risk from newest critical Java bug
Got Java? If so, then you might choke on it. Again. There's really bad news in the security world today as was declared on the Full Disclosure mailing list. Security Explorations, a Polish security firm, announced another new critical Java flaw that is worse than the last Java zero-day. This one affects Java 5, Java 6 and Java 7. In other words, the security researchers said it puts 1 billion users... Read More

FTC short-circuits privacy-invading computer spy ring
The Federal Trade Commission today said it settled a case that involved seven rent-to-own PC firms and a software vendor which worked together to spy on consumers using the rented computers. The software captured screenshots of confidential and personal information, logged computer keystrokes, and in some cases took webcam pictures of people in their homes, all without owner notice or consent. MORE:... Read More

Man held iPhone for ransom, police charge
Sadly, it's likely not the last time you'll hear of this but kind of stupidity but, a Pennsylvania man was arrested recently for refusing to return an iPhone he found unless he was paid a $40 ransom. Read More


WHITE PAPER: Blue Coat Systems

Optimize and Secure Cloud, SaaS, BYOD, and Social Media
Today's threat landscape has migrated to the web causing many security professionals to prevent direct Internet access at the branch. But with new cloud-based security solutions from Blue Coat you can re-architect your network to embrace the Internet – safely – and optimize application performance. Learn more.

Researcher: IEEE website exposed usernames, passwords on 100,000 members in plaintext
A Romanian researcher says he discovered a data breach in an FTP server owned by the Institute of Electrical and Electronics Engineers (IEEE) that exposed usernames and passwords for almost 100,000 members. Read More

Big Changes Could be Coming in the Endpoint Security Market
Over the past few weeks, I've spoken to a number of security vendors including Bit9, Bromium, CounterTack, Invincea, Malwarebytes, and Sourcefire. Each of these firms is offering some type of new security technology for detecting/blocking advanced malware that circumvents traditional defenses like firewalls, IDS/IPS, and antivirus software. Read More

Security Threat Landscape - October 2012
Security Threat Landscape - October 2012 From: networkworld Views: 0 0 ratings Time: 00:00 More in Science & Technology Read More


WHITE PAPER: BMC Software

You Believe in SaaS First, What's Next?
SaaS is growing up. IT executives are recognizing the power of software as a service (SaaS) to reduce the amount of hardware and software owned and managed on-premises and also transform IT to meet business objectives more effectively. This paper reviews strategies to help make the transition more successful. Read Now!

Theories mount on bank attacks, but experts stress defense
The unexplained outages last week on the public websites of Bank of America and JPMorgan Chase have led to as many as five theories about the source. However, security experts say the most important thing is to focus on an effective defense against them. Read More

Arab hackers attack Western websites over film
A group of Arab hackers have threated to attack Western websites in retaliation for an anti-Islamic American film that has sparked outrage and violence across the Middle East. Read More

After hack, Bitcoin exchange comes back online
A small New York-based company that specializes in exchanging Bitcoins is back online after hackers stole about US$250,000 worth of the virtual currency earlier this month. Read More



SLIDESHOWS

15 more useful Cisco sites
Another lineup in our continuing search for the most useful sites on the Web for Cisco users and practitioners.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Free security products out there for the asking
  2. The LTE iPhone experience: What to expect with iPhone 5
  3. Eight simple steps to make the upgrade to iPhone 5 easier
  4. How the U.S. is winning the race to next-gen Internet
  5. Six free Cisco Labs
  6. Apple apparently ripped off iPad clock design from Swiss Rail Company
  7. The top 17 smartphones from the major carriers
  8. 6 signs that the U.S. is overtaking the world at IPv6
  9. 11ac will be faster, but how much faster really?
  10. iOS 6 Wi-Fi glitch a Web problem, not a firmware issue

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: