Computerworld Security
April 30, 2009
___________________________________________________________
***************SPONSOR**************************************
Open Source Security Myths Dispelled
Open Source Software is computer software whose source code is available to the
general public. When choosing between proprietary and open source security
solutions, organizations are misled by myths. As a result, they ask the wrong
questions when evaluating their options and unnecessarily limit their solutions.
This white paper will help dispel myths, allowing IT decision makers to focus on
more important organizational issues.
************************************************************
In this issue:
1. Report: U.S. needs 'transparent' policies for carrying out cyberattacks
2. Microsoft doctors AutoRun in Windows 7 to stymie Conficker
3. Phishers hit Facebook with scam messages
4. Adobe confirms PDF zero-day, urges users to kill JavaScript
5. The Kilo-Day threat and mundane security
6. No jail time for Nugache worm creator
OTHER RESOURCES
_______________
Bringing Order and Security to your Mobile Workforce
http://cwflyris.computerworld.com/t/4921331/283856143/180599/0/
The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
http://cwflyris.computerworld.com/t/4921331/283856143/187181/0/
How to Optimize Your Capture Workflow
http://cwflyris.computerworld.com/t/4921331/283856143/187240/0/
_______________
Report: U.S. needs 'transparent' policies for carrying out cyberattacks
The National Research Council, which provides advice to the federal government,
warned in a report that the U.S. has no clear legal or policy framework
governing the use of cyberattacks against adversaries.
http://cwflyris.computerworld.com/t/4921331/283856143/187241/0/
Microsoft doctors AutoRun in Windows 7 to stymie Conficker
Prompted by the spread of the Conficker worm through infected USB drives,
Microsoft will unveil changes in the public Windows 7 Release Candidate that are
designed to stymie such hacker strategies.
http://cwflyris.computerworld.com/t/4921331/283856143/187242/0/
Phishers hit Facebook with scam messages
Facebook users were hit with a phishing attack that tried to steal names and
passwords from users of the popular social network.
http://cwflyris.computerworld.com/t/4921331/283856143/187243/0/
***************SPONSOR**************************************
A Practical Guide to Building an Effective Patch Management Process
Worms, viruses and hackers are a constant threat to IT systems, and maintaining
timely patching practices is the best defense. This white paper surveys today's
best practices for implementing a sound patch management strategy and process.
************************************************************
Adobe confirms PDF zero-day, urges users to kill JavaScript
Adobe Systems late Tuesday acknowledged that all versions of its popular PDF
software, including editions for Windows, the Mac and Linux, contain at least
one, and maybe two, critical vulnerabilities.
http://cwflyris.computerworld.com/t/4921331/283856143/187244/0/
The Kilo-Day threat and mundane security
In the security business we spend a lot of time worrying about the "zero-day"
threat that appears out of nowhere and immediately starts attacking a hereto
unknown vulnerability. We imagine genius hackers probing software to discover
new and unique ways of attacking our systems. We worry about the
yet-undiscovered bugs that lie dormant in our operating systems. We worry so
much that we overlook the vulnerabilities we already know about. The ones that
have been hanging around on our systems, known but unaddressed, unpatched and
wide open. The kilo-day threat is the one that we've know about for 1,024+ days,
or roughly three years. While mundane and basic info-hygiene is boring it is the
best defense.
http://cwflyris.computerworld.com/t/4921331/283856143/187245/0/
No jail time for Nugache worm creator
A 20-year-old man from Cheyenne, Wyoming, has been sentenced to five years'
probation for creating what researchers called one of the most sophisticated
botnet networks of hacked computers in recent years.
http://cwflyris.computerworld.com/t/4921331/283856143/187246/0/
***************SPONSOR**************************************
Thinking Beyond Tape: The Case Against Tape Backup
Many companies are already backing up their main and branch office systems to
tape, but what they don't understand is just how vulnerable their data and their
business remains. This whitepaper explores the high cost, complexity and
potentially dangerous shortcomings of a strategy based only on tape backup.
http://cwflyris.computerworld.com/t/4921331/283856143/182838/0/
************************************************************
SHARK BAIT OF THE DAY
_____________________
Helping the help desk
I work on the same floor as the help desk in our firm. Naturally, I see them in
the break room and around the floor, so I've formed friendships with some of
them. I just got this IM: "Do you have something that can read metadata?" ...
http://cwflyris.computerworld.com/t/4921331/283856143/187115/0/
SEEKING THE VERY BEST IT LEADERS
________________________________
Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at
http://cwflyris.computerworld.com/t/4921331/283856143/183552/0/
(Send questions to premier100@computerworld.com.)
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwflyris.computerworld.com/t/4921331/283856143/156832/0/
COMPUTERWORLD ON TWITTER
________________________
Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/4921331/283856143/126780/0/
___________CONTACTS/SUBSCRIPTIONS___________________________
FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com
ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.
PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/4921331/283856143/72509/0/
SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.
To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/4921331/283856143/72510/0/
To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/4921331/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz00OTIxMzMx&x=36af42c8
If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.
Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/4921331/283856143/72511/0/
Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701
No comments:
Post a Comment