All the week’s news and views about Security, 04/14/09
Twitter Worm Attack Continues: Here’s How to Keep Safe
http://www.networkworld.com/nlsecuritynewsal191582
http://www.networkworld.com/nlsecuritynewsal191582
The malicious worm affecting Twitter over the weekend has now
mutated and continues to invade the popular micro-blogging
network. Although Twitter is taking action against the problem,
security analysts fear that further mutations of the worm will
continue to wreak havoc on the network over the week.Read full
story http://www.networkworld.com/nlsecuritynewsal191582
mutated and continues to invade the popular micro-blogging
network. Although Twitter is taking action against the problem,
security analysts fear that further mutations of the worm will
continue to wreak havoc on the network over the week.Read full
story http://www.networkworld.com/nlsecuritynewsal191582
Senior Editor Ellen Messmer covers security for Network World.
E-mail Ellen mailto:emessmer@nww.com .
E-mail Ellen mailto:emessmer@nww.com .
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
Network Management Solutions in your backyard. Answers are as close
as the IT Roadmap event in your area. You can ask questions,
compare quotes, and gain a year’s worth of direction in less than a
day. Coming to 10 cities in ’09 including Boston in May and Atlanta
in June. Qualify to attend free at
http://www.nww.com/rpgx.jsp?c=XU1PTB1012Z4303.
as the IT Roadmap event in your area. You can ask questions,
compare quotes, and gain a year’s worth of direction in less than a
day. Coming to 10 cities in ’09 including Boston in May and Atlanta
in June. Qualify to attend free at
http://www.nww.com/rpgx.jsp?c=XU1PTB1012Z4303.
_______________________________________________________________
RELATED EDITORIAL LINKS
Twitter wrestles with fourth worm attack
http://www.networkworld.com/nlsecuritynewsal191583 Another worm
attack early Monday on Twitter kept the micro-blogging Web
service chasing down infected accounts and deleting rogue
tweets.
http://www.networkworld.com/nlsecuritynewsal191583 Another worm
attack early Monday on Twitter kept the micro-blogging Web
service chasing down infected accounts and deleting rogue
tweets.
Weekend worms strike Twitter, teen admits responsibility
http://www.networkworld.com/nlsecuritynewsal191584 Twitter was
hit with at least three different worm attacks that started
Saturday and continued into Sunday, the micro-blogging service
acknowledged as it promised users it would review its coding
practices.
http://www.networkworld.com/nlsecuritynewsal191584 Twitter was
hit with at least three different worm attacks that started
Saturday and continued into Sunday, the micro-blogging service
acknowledged as it promised users it would review its coding
practices.
1 in 5 Windows PCs still hackable by Conficker
http://www.networkworld.com/nlsecuritynewsal191585 Although the
media blitz about the Conficker worm prompted a significant
number of enterprise users to finally fix a six-month-old
Windows bug, about 1 in 5 business computers still lack the
patch, a security company said Monday.
http://www.networkworld.com/nlsecuritynewsal191585 Although the
media blitz about the Conficker worm prompted a significant
number of enterprise users to finally fix a six-month-old
Windows bug, about 1 in 5 business computers still lack the
patch, a security company said Monday.
Botlab keeping an eye on spamming botnets
http://www.networkworld.com/community/node/40855 University of
Washington researchers have developed a prototype system called
Botlab that monitors botnets to gain insight into a major
generator of spam.
http://www.networkworld.com/community/node/40855 University of
Washington researchers have developed a prototype system called
Botlab that monitors botnets to gain insight into a major
generator of spam.
Does Social Networking Require User Policy Changes?
http://www.networkworld.com/nlsecuritynewsal191586 IT security
administrators have had a fairly easy case to make against such
social networking sites as Myspace in the past. Myspace in
particular tends to be a place for the mostly personal, and some
profiles are simply front companies for online mobsters and
malware pushers.
http://www.networkworld.com/nlsecuritynewsal191586 IT security
administrators have had a fairly easy case to make against such
social networking sites as Myspace in the past. Myspace in
particular tends to be a place for the mostly personal, and some
profiles are simply front companies for online mobsters and
malware pushers.
PCI security rules may require reinforcements
http://www.networkworld.com/nlsecuritynewsal191587 The PCI
standard, long touted as one of the private sector’s strongest
attempts to regulate itself on IT security, is increasingly
being slammed by critics who claim that the rules aren’t doing
enough to protect credit and debit card data.
http://www.networkworld.com/nlsecuritynewsal191587 The PCI
standard, long touted as one of the private sector’s strongest
attempts to regulate itself on IT security, is increasingly
being slammed by critics who claim that the rules aren’t doing
enough to protect credit and debit card data.
Can the status quo threaten your LAN?
http://www.networkworld.com/nlsecuritynewsal191588 In times of
economic crisis people tend to seek the safety and security of
the status quo. “Doing what you’ve always done, and what
everyone else is doing, is the most prudent course,” goes the
thinking.
http://www.networkworld.com/nlsecuritynewsal191588 In times of
economic crisis people tend to seek the safety and security of
the status quo. “Doing what you’ve always done, and what
everyone else is doing, is the most prudent course,” goes the
thinking.
Security Tops IT Budget Priorities
http://www.networkworld.com/nlsecuritynewsal191589 Security is
on the minds of American companies and many are still making
room in their budgets to invest in IT security initiatives,
according to a survey released Monday by Robert Half Technology.
http://www.networkworld.com/nlsecuritynewsal191589 Security is
on the minds of American companies and many are still making
room in their budgets to invest in IT security initiatives,
according to a survey released Monday by Robert Half Technology.
Trend Micro dishes out security smorgasbord
http://www.networkworld.com/nlsecuritynewsal191590 Trend Micro
Monday dished out a smorgasbord of endpoint security products
that put the focus on Trend’s cloud-based architecture and its
partnership with systems-management vendor BigFix.
http://www.networkworld.com/nlsecuritynewsal191590 Trend Micro
Monday dished out a smorgasbord of endpoint security products
that put the focus on Trend’s cloud-based architecture and its
partnership with systems-management vendor BigFix.
RSA upgrades data leak prevention suite
http://www.networkworld.com/nlsecuritynewsal191591 EMC’s RSA
division Monday announced an upgraded version of its data-leak
prevention suite, adding over twenty policy templates for
recognizing personal identifiable information in countries
around the world, including Spain and New Zealand.
http://www.networkworld.com/nlsecuritynewsal191591 EMC’s RSA
division Monday announced an upgraded version of its data-leak
prevention suite, adding over twenty policy templates for
recognizing personal identifiable information in countries
around the world, including Spain and New Zealand.
Podcast: Prepping for Tougher Health Data Rules
http://www.networkworld.com/nlsecuritynewsal191592 As part of
the recent stimulus bill, the HITECH Act will create standard
electronic health records for every American by 2014, as well as
introduce strict new rules for the protection of these health
records. John Linkous from eIQnetworks discusses the components
of the act and how IT can start preparing now for the new
standards. (10:12)
http://www.networkworld.com/nlsecuritynewsal191592 As part of
the recent stimulus bill, the HITECH Act will create standard
electronic health records for every American by 2014, as well as
introduce strict new rules for the protection of these health
records. John Linkous from eIQnetworks discusses the components
of the act and how IT can start preparing now for the new
standards. (10:12)
User education key to IT security: Microsoft
http://www.networkworld.com/nlsecuritynewsal191593 With the
release of its latest Security Intelligence Report, Microsoft is
encouraging its partners and customers to become more security
aware and educated, as new attack tactics are on the rise.
http://www.networkworld.com/nlsecuritynewsal191593 With the
release of its latest Security Intelligence Report, Microsoft is
encouraging its partners and customers to become more security
aware and educated, as new attack tactics are on the rise.
Top Trends: Patch Management
http://www.networkworld.com/nlsecuritynewsal185732 Find out how
patch-management products work, and what they can do for you, in
this Product Guide.
http://www.networkworld.com/nlsecuritynewsal185732 Find out how
patch-management products work, and what they can do for you, in
this Product Guide.
April giveaways http://www.networkworld.com/community/node/40434
galore
Cisco Subnet http://www.networkworld.com/subnets/cisco/
andMicrosoft Subnet
http://www.networkworld.com/subnets/microsoft/ are giving away
training courses from Global Knowledge, valued at $2,995 and
$3,495, and have copies of three hot books up for grabs:CCVP
CIPT2 Quick Referenceby Anthony Sequeira,Microsoft Voice Unified
Communicationsby Joe Schurman andMicrosoft Office 2007 On
Demandby Steve Johnson.Deadline for entries
http://www.networkworld.com/community/node/40434 April 30.
galore
Cisco Subnet http://www.networkworld.com/subnets/cisco/
andMicrosoft Subnet
http://www.networkworld.com/subnets/microsoft/ are giving away
training courses from Global Knowledge, valued at $2,995 and
$3,495, and have copies of three hot books up for grabs:CCVP
CIPT2 Quick Referenceby Anthony Sequeira,Microsoft Voice Unified
Communicationsby Joe Schurman andMicrosoft Office 2007 On
Demandby Steve Johnson.Deadline for entries
http://www.networkworld.com/community/node/40434 April 30.
Network World on Twitter http://twitter.com/NetworkWorld Get
our tweets and stay plugged in to networking news.
our tweets and stay plugged in to networking news.
TOP STORIES | MOST DUGG STORIES
http://www.networkworld.com/nlsecuritynewsal191594
http://www.networkworld.com/nlsecuritynewsal191594
1. Conficker awakens, starts scamming
http://www.networkworld.com/nlsecuritynewsal191595
http://www.networkworld.com/nlsecuritynewsal191595
2. Microsoft eating up U.S. and global netbook markets
http://www.networkworld.com/nlsecuritynewsal191596
http://www.networkworld.com/nlsecuritynewsal191596
3. Bill would give Obama power to shut down Internet
http://www.networkworld.com/nlsecuritynewsal191597
http://www.networkworld.com/nlsecuritynewsal191597
4. Are you an IT geezer? (and we mean that in a good way)
http://www.networkworld.com/nlsecuritynewsal191598
http://www.networkworld.com/nlsecuritynewsal191598
5. A Twitter virus shows up: StalkDaily
http://www.networkworld.com/nlsecuritynewsal191599
http://www.networkworld.com/nlsecuritynewsal191599
6. The 10 worst Microsoft product names of all time
http://www.networkworld.com/nlsecuritynewsal191600
http://www.networkworld.com/nlsecuritynewsal191600
7. Netbook computers spark corporate interest
http://www.networkworld.com/nlsecuritynewsal191601
http://www.networkworld.com/nlsecuritynewsal191601
8. Conficker, the Internet’s No.1 threat, gets an update
http://www.networkworld.com/nlsecuritynewsal191602
http://www.networkworld.com/nlsecuritynewsal191602
9. The implications of Skype’s free software application for
iPhone http://www.networkworld.com/nlsecuritynewsal191603
iPhone http://www.networkworld.com/nlsecuritynewsal191603
10. Fear and loathing in Windows 7: Testing Branch Cache using
Linux http://www.networkworld.com/nlsecuritynewsal191604
Linux http://www.networkworld.com/nlsecuritynewsal191604
MOST-WATCHED VIDEO1. Students learn through robot battles
http://www.networkworld.com/nlsecuritynewsal191605
http://www.networkworld.com/nlsecuritynewsal191605
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
ARCHIVE LINKS
Network Security Research Center
http://www.networkworld.com/topics/security.html : For breaking
security news, news analysis, blogs, newsletters, product tests,
and more.
http://www.networkworld.com/topics/security.html : For breaking
security news, news analysis, blogs, newsletters, product tests,
and more.
Security Strategies Newsletter
http://www.networkworld.com/newsletters/sec/index.html :
Norwich University Associate Professor M. E. Kabay takes the
long view of security issues and resources for ensuring your
network, computer and facilities remain secure. View the archive
and to sign up for the newsletter here
http://www.networkworld.com/newsletters/sec/index.html
_______________________________________________________________
http://www.networkworld.com/newsletters/sec/index.html :
Norwich University Associate Professor M. E. Kabay takes the
long view of security issues and resources for ensuring your
network, computer and facilities remain secure. View the archive
and to sign up for the newsletter here
http://www.networkworld.com/newsletters/sec/index.html
_______________________________________________________________
BONUS FEATURE
Accurately Troubleshoot your Apps. Optimize your application
troubleshooting efforts with the best practices described in this
whitepaper, “Application Troubleshooting Guide.” Eliminate finger
pointing between departments. Find out how to isolate the source of
application performance problems and what to look for when
troubleshooting. Get all of the details today.
http://www.nww.com/rpgx.jsp?c=XU1PTA1013Z4161 Download this
whitepaper now.
troubleshooting efforts with the best practices described in this
whitepaper, “Application Troubleshooting Guide.” Eliminate finger
pointing between departments. Find out how to isolate the source of
application performance problems and what to look for when
troubleshooting. Get all of the details today.
http://www.nww.com/rpgx.jsp?c=XU1PTA1013Z4161 Download this
whitepaper now.
_______________________________________________________________
PRINT SUBSCRIPTIONS AVAILABLE
You’ve got the technology snapshot of your choice delivered to
your inbox each day. Extend your knowledge with a print
subscription to the Network World newsweekly, Apply today at
http://www.subscribenw.com/nl2
http://www.networkworld.com/nlsecuritynewsal166186
your inbox each day. Extend your knowledge with a print
subscription to the Network World newsweekly, Apply today at
http://www.subscribenw.com/nl2
http://www.networkworld.com/nlsecuritynewsal166186
International subscribers, click here:
http://www.subscribenw.com/dp30
https://www.subscribenww.com/cgi-win/nww.cgi?paid&p=ADP608NW
_______________________________________________________________
http://www.subscribenw.com/dp30
https://www.subscribenww.com/cgi-win/nww.cgi?paid&p=ADP608NW
_______________________________________________________________
ParagonHost
The Spam Busters
Virtual Graffiti
Leave a comment