Friday, October 22, 2010

Run a background check on yourself; Microsoft's anti-Zeus tool cleans quarter-million PCs

Microsoft's anti-Zeus tool cleans quarter-million PCs | Best practices for rolling Out 802.1X authentication

Network World Compliance

Forward this to a Friend >>>


Privacy? Run a background check on yourself
My company hired a new employee recently and as part of my responsibilities, I ran a basic background check for our new hire. If you've never seen a professional background check, you will most likely be shocked by the level of detail that can be gleaned from public records. Read More


WHITE PAPER: Iron Mountain

The Know-IT-All's Guide
This fun-to-read but informative ebook can help you successfully plan for eDiscovery and ensure your meetings with legal will never be the same. Read Now.

In this Issue


WHITE PAPER: Array Networks

Get Control of Your Datacenter
Application Delivery Controller helps IT leverage data center technologies to quickly adapt to changing business demands. Read now!

Microsoft's anti-Zeus tool cleans quarter-million PCs
Microsoft said its free malware cleaning tool had scrubbed the money-stealing Zeus bot from nearly 275,000 Windows computers in under a week. Read More

Best practices for rolling Out 802.1X authentication
Many organizations have put off the deployment of IEEE 802.1X authentication for years while waiting for networking and computing vendors to make it easier. Earlier this year, the IT team at Brigham Young University–Hawaii set out to deploy a secure 802.1X Cisco and Xirrus wireless network to serve the university's 3,000 users. The team shares its best practices to ensure a smooth 802.1X implementation in any organization. Read More

The Link Between Recent Privacy 'Breaches'
Facebook has been the subject of intense scrutiny over privacy concerns...again. Or, is it still? Facebook is not alone, however, as Twitter and Android have also been recent targets of privacy ire. Each of these privacy incidents has something else in common as well--they are a result of relationships with third-parties that users have approved. Read More

Trusteer extends secure browsing services to general businesses
Trusteer is expanding its secure-browsing service beyond financial institutions to general businesses with a new offering that goes beyond protections for consumers accessing their bank accounts. Read More

Widespread Confusion over Protecting Privacy
Are you taking the appropriate steps to protect your identity and privacy online? A new survey from Anonymizer suggests that not only is there a good chance you're not, but that you don't even clearly understand what those steps might be. Read More

Half of home Wi-Fi networks vulnerable to hacking
Nearly half of all home Wi-Fi networks could be hacked within five seconds, says CPP. Read More


WHITE PAPER: HP

Building a Cure for the Next-Generation Data Center
In this era of real-time medicine, global collaboration and electronic health records, healthcare organizations are challenged to deliver mission-critical services inexpensively. Adopting a converged, next-generation data center architecture built on open standards allows you to roll out promising new apps without breaking the bank. Read Now

IBM uses 'virtual doorman' to lock down cloud computing
IBM has developed a new rootkit-detection system designed to make it easier to detect malicious attacks on virtualized data centers. Read More

Limitations of software-as-a-service highlighted at Gartner ITxpo
ORLANDOD -- Software-as-a-service (SaaS) may offer the advantage of application-based computing you can pay for as needed, but there are pitfalls, too, that are becoming increasingly evident, according to Gartner analyst Robert DeSisto. Read More

Apps Going Viral: When Your Smartphone Gets Hacked
How secure is banking on your iPhone? How sure are you that those app developers have plugged those security holes? So far, there isn't much malicious code out there targeted at smartphones, but that soon may change as smartphone sales surpass those of laptop and desktop machines. Read More

Users neglect Java patches, leave attack door wide open
Oracle should piggyback on Microsoft's update service to boost users' chances of running a patched version of Java, a security expert said. Read More

Man pleads guilty to using hack, pump-and-dump botnet
A Chandler, Arizona, man has pleaded guilty to charges related to his role in a pump-and-dump scam that inflated penny stock prices via spam and hacked computers. Read More

Panda Security releases Mac app
Panda Security has announced Panda Antivirus for Mac. In doing so, the company must answer the same question faced by every other security vendor trying to sell in this market: Do Macs really need protecting? Read More


WHITE PAPER: Emerson Network Power

10 reasons for MergePoint Infrastructure Explorer Software.
To operate at peak efficiency, the data center manager must have immediate access to the right information. With the Avocent infrastructure planning and management solution, you can quickly realize the benefits of predictive simulation and modeling for every device in your data center. Read now.

Facebook battles another privacy firestorm
Facebook contended that reports that the private data of users has been revealed to third part firms have been 'exaggerated.' Read More

DHS simulates terror attack in subway systems
In 1995, the subway system in Tokyo was the target of a domestic terrorism attack involving a potent gas called sarin, a chemical weapon that can cause neurological damage and even death. In five coordinated incidents, members of a radical-religious group known as Aum Shinrikyo released the sarin gas on five trains in the Tokyo subway system. The attack killed 12 commuters, seriously injured 54 and affected 980 more who experienced some health effect. The lesson learned in the tragedy was that chemical agents have the potential do widespread damage -- and a subway system provides an ideal environment for dangerous gas to travel fast. Read More

IT industry says improving cyber security will be tough
Huge improvements are needed in the government's approach to cyber security, the IT security industry has warned ahead of today's Strategic Defence and Security Review. Read More

New Rules for Employees' Mobile Device Privacy
How CIOs should adjust their privacy policies to conform to the Supreme Court's decision on monitoring employees' text messages. Read More

Zeus botnet gang targets Charles Schwab accounts
Criminals are now using a Zeus botnet to pillage Charles Schwab investment accounts, a security researcher said. Read More

Comcast begins DNS security rollout
Comcast has begun migrating its customers to a new Internet security mechanism that will help protect them from being inadvertently routed to phony Web pages for pharming attacks, identity theft and other scams. Read More

Google: Change your password twice a year to keep safe
Change your passwords twice a year and never reuse them. Those are a few of the tips Google lists in an online security checklist that helps people stay one step ahead of the scammers. Read More

Security guidelines aimed at zapping power industry cyberattacks, malfunctions
Based on input from the federal government, the North American Electric Reliability Corp., whose mission is to ensure the reliability of the bulk-power system, Thursday sent new security guidelines to about 2,000 electric-power operators to prevent compromise and malfunction of the grid. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Red Hat CEO: Software vendor model is broken
  2. HP opens attack on Cisco certifications
  3. iOnApple: Apple revamps the MacBook Air
  4. Does Fallout New Vegas jump the cockroach?
  5. Twitter: Who is reading your DMs? There's an app for that ...
  6. Secrets of Windows Back Office Servers
  7. Limitations of software-as-a-service highlighted at Gartner ITxpo
  8. Open source report: Android vendors concede tablet market to Apple
  9. Privacy? Run a background check on yourself
  10. Hybrid technology to deliver HDTV throughout home

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: