Friday, November 12, 2010

SEO 'poisoning' way up; Women more likely to fall for 'Net fraud, study claims

Women more likely to fall for Internet fraud | Top 10 network vulnerabilities inside the network

Network World Compliance

Forward this to a Friend >>>


Search engine optimization 'poisoning' way up this year: report
Cybercrooks continue to abuse the Web, boosting their ability to produce what's called search engine optimization poisoning so that individuals making use of search engines such as Google's increasingly are ending up with choices that are dangerous malware-laden URL links. Read More


RESOURCE COMPLIMENTS OF: Sophos

FREE Compliance for Dummies Book from Sophos
Get 10 tips to achieve compliance. Request a book today!

In this Issue


WHITE PAPER: Quest Software

Choosing the Right Active Directory Bridge Solution for You
The importance of a solid Active Directory (AD) bridge in your diverse IT environment can't be minimized. An AD bridge allows Unix, Linux and Mac systems to coexist with a Windows infrastructure. Further, it consolidates countless identities and passwords, reducing complexity and cost while improving security and productivity. Read Now

Women more likely to fall for Internet fraud
Women are significantly more likely than men to fall for Internet scams, a new piece of research has claimed after conducting an online test. Read More

Top 10 network vulnerabilities inside the network
Today's state-of-the-art network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Unfortunately, all of the crosses, garlic, wooden stakes and silver bullets in the world have little effect on today's most nefarious cyber creatures. Here are the top 10 ways your network can be attacked from inside and what you can do to insure your business never has to perform an exorcism on your servers. Read More

Microsoft antivirus creating security 'monoculture'
Microsoft should start offering Windows users free antivirus software from a range of companies and not just promote its own Security Essentials product, a rival has said. Read More

AVG to acquire Android security firm
AVG Technologies Tuesday announced plans to buy out Israel-based start-up DroidSecurity for an undisclosed price by year-end. Read More

Firesheep, Blacksheep, and Protecting Your Wi-Fi Data
Despite the convenience, free public Wi-Fi networks like those found in hotels, Starbucks, and McDonald's are also a serious risk when it comes to your data and personal information. A new Firefox plug-in makes it even easier for tech novices to snoop wireless traffic, making it even more crucial than ever that users understand the risks and take precautions when using Wi-fi hotspots. Read More

Quest buys data protection vendor BakBone
Quest Software announced Tuesday that it is buying data-protection vendor BakBone for US$55 million, adding to its own portfolio of similar wares. The deal is expected to close in the first quarter of next year. Read More


WHITE PAPER: Brocade

Multi-Site and Campus Area Wireless LANs
Discover industry best practices that drive enterprise-class WLAN performance. Review this enlightening Aberdeen study that gives actionable recommendations on how to improve end-to-end network performance and cut multi-location WLAN budgets. Read now!

Apple smashes patch record with gigantic update
Apple this week patched a record 134 Mac OS X vulnerabilities, easily topping the previous record of fixing 90 flaws in March. Read More

Google, Facebook duke it out over user data
Internet giants Google and Facebook have been having a war of words this week over user data portability. Read More

IT pros, workers show a 'disconnect' over mobile devices and policies
Two-thirds of workers in a survey for Cisco said their companies need to improve IT policies; at the same time, 20% of IT professionals said their relationship with employees is "strained and dysfunctional." Read More

Federal regs haven't improved safety of patient records, study shows
While the government has passed laws to better protect private health information, most data healthcare providers say that information isn't any safer than it was before, according to a survey by the Ponemon Institute. Read More

Facebook API flaw discovered
Social-networking services provider Sendible says it's uncovered a major flaw in how Facebook works and is cooperating with Facebook to fix the issue. Read More

Malicious websites increase by over 100% in a year
The number of malicious website on the net has increased by more than 100 percent, since last year, says Websense. Read More


WHITE PAPER: Iron Mountain

Backing Up Your Servers: Why It's Essential
Read this white paper to examine the setbacks of traditional backup, gain a better understanding of online backup, and discover why Iron Mountain's LiveVault solution for automated server backup and recovery won the 2006 award for Best Storage Software Solution from the Software and Information Industry Association. Read now.

Man pleads guilty to $4.8 million ATM fraud
The general manager of a business partner of Connecticut's Domestic Bank has pleaded guilty to his role in a scheme that siphoned millions from automated teller machines. Read More

Student who hacked Bill O'Reilly gets 30 months
A 23-year-old Bellevue, Ohio, man has been sentenced to 30 months in prison following a 2007 online crime spree in which he used a network of hacked computers to attack and knock offline websites belonging to conservative pundits Bill O'Reilly and Ann Coulter. Read More

Man loses $20 million after taking laptop for repair
A New York couple have been charged with defrauding a wealthy musician to the tune of $20 million (£12.3 million) after he innocently visited their computer servicing company to have a virus removed from his laptop. Read More

Gartner: Companies need shift in private cloud security
The security systems of businesses must "evolve" as they move from virtualised data centres towards private cloud infrastructures, according to analysts at Gartner. Read More

Hack our products and we'll pay you: Barracuda Networks
Barracuda Networks Tuesday announced it will pay more than $3,100 to anyone who can hack into its security products, saying the bug bounty program is the first ever from a pure-play security vendor. Read More

Microsoft Office Takes Center Stage for Patch Tuesday
Eleven months down, one to go. Today is Patch Tuesday for November, and Microsoft is taking it easy on IT admins with a relatively meager three security bulletins. Microsoft Office has the dubious honor of being the focus of this month's patches--while a recently uncovered zero-day flaw in Internet Explorer remains unpatched. Read More

Danger to IE users climbs as hacker kit adds exploit
Microsoft will likely issue an emergency kit to an unpatched IE flaw after it was added to the Eleonore crimeware kit. Read More

Scaling intrusion-prevention systems for 10G, 40G and beyond
While many IT security professionals regard intrusion-preventions systems to be a natural extension of intrusion-detection systems, an IPS is actually another type of access control mechanism, rather than simply a a sister to IDS. In fact, it may surprise you to know that the term IPS is actually younger than IDS. Read More



Fill out a survey, get rewarded

Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

Goodies from the Subnets
We've got SharePoint 2010 training for up to three people from Webucator up for grabs. There's an iPad available, too. Enter to win one!

SLIDESHOWS

Microsoft Windows after 25 years: A visual history
More than nine out of 10 computers run some version of Windows. But no one could have predicted that would be the case when Windows 1.0 launched 25 years ago as a graphical front end for MS-DOS. Here's a look at Windows through the years and some thoughts on what the future might hold.

Cool Yule favorites: 15 techie gifts we like
Ho Ho Ho, it's time again to get our holiday wish lists together. Here are our 15 favorite products from the 140+ products submitted and tested in this year's Cool Yule Tools holiday gift guide.

MOST-READ STORIES

  1. Red Hat releases RHEL 6
  2. Man loses $20 million after taking laptop for repair
  3. T-Mobile kicks off sales of Galaxy Tab
  4. Google employee axed over 10% raise leak
  5. Why Canonical should buy System76
  6. Cisco sends up a warning flare
  7. How Android conquered the mobile world in just three years
  8. Cool Yule Favorites: 15 techie gifts we like
  9. Apache to Oracle: We're leaving the Java Community Process
  10. Home and office gear gift ideas

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: