Computerworld Security
May 07, 2009
___________________________________________________________
***************SPONSOR**************************************
Protecting Data From the Cyber Theft Pandemic
Stealth Web malware has exploded onto the IT scene and become a billion-dollar
global pandemic. It steals your confidential data right from under traditional
"solutions" like antivirus or intrusion prevention systems. Today's IT needs a
next generation security technology to accurately intercept polymorphic stealth
attacks. Download the white paper and learn how FireEye identifies malware
problems before a data breach occurs.
http://cwflyris.computerworld.com/t/4972740/283856143/187801/0/
************************************************************
In this issue:
1. Study: US air traffic control vulnerable to cyberattack
2. 'Hacker' threatens to expose health data, demands $10M
3. Windows 7 RC ignores file extension security risk
4. Image spam returns with a vengeance
5. IPv6 security guru fields questions
6. SOA Security: How Irish Luck Went a Long Way
OTHER RESOURCES
_______________
Bringing Order and Security to your Mobile Workforce
http://cwflyris.computerworld.com/t/4972740/283856143/180599/0/
The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164
http://cwflyris.computerworld.com/t/4972740/283856143/187181/0/
How to Optimize Your Capture Workflow
http://cwflyris.computerworld.com/t/4972740/283856143/187240/0/
_______________
Study: US air traffic control vulnerable to cyberattack
U.S. air traffic control systems are at high risk of attack due to their links
to insecure Web applications run by aviation authorities around the country,
according to a U.S. Department of Transportation audit.
http://cwflyris.computerworld.com/t/4972740/283856143/189062/0/
'Hacker' threatens to expose health data, demands $10M
A hacker claimed to have broken into a database and encrypted millions of
prescription records at Virginia's Department of Health Professions, but it
remains unclear what happened.
http://cwflyris.computerworld.com/t/4972740/283856143/189063/0/
Windows 7 RC ignores file extension security risk
Microsoft's Windows 7 Release Candidate (RC) continues a long-running practice
of hiding file extensions that puts users at risk, a security researcher said
today.
http://cwflyris.computerworld.com/t/4972740/283856143/189064/0/
***************SPONSOR**************************************
Simplify Migration to Microsoft Windows Server 2008
For many enterprises, the biggest hurdle in upgrading to the Windows Server 2008
OS is the complexity of the migration process. Dell helps simplify IT and reduce
risk with comprehensive service offerings and a validated, repeatable approach
that includes seamless support for integrated Microsoft applications on Dell
servers.
http://cwflyris.computerworld.com/t/4972740/283856143/187823/0/
************************************************************
Image spam returns with a vengeance
Spammers have turned back the clock and are recycling an old tactic by planting
their messages in images, a security researcher warned today.
http://cwflyris.computerworld.com/t/4972740/283856143/189065/0/
IPv6 security guru fields questions
Although he acknowledges that businesses have yet to embrace IPv6, security guru
Scott Hogg says that doesn't mean IT executives can ignore the security problems
that the next generation Internet protocol can present. After all, he notes,
operating systems such as Microsoft Vista and Linux are already IPv6 capable and
thus any networks that use them might be handling IPv6 traffic without their
operators' knowledge. In this question and answer session, Hogg, who is also the
coauthor of the Cisco-approved IPv6 Security guidebook and who writes regularly
for Network World's Cisco Subnet blog, talks about steps that network operators
can take to ensure that they don't
http://cwflyris.computerworld.com/t/4972740/283856143/189066/0/
SOA Security: How Irish Luck Went a Long Way
From a security perspective,
http://cwflyris.computerworld.com/t/4972740/283856143/189067/0/
***************SPONSOR**************************************
Security Configuration Management
In this short web video, follow along with Jim Hansen, Senior Product Manager
with Big Fix, as he explains why Security Configuration Management is so
important for all organizations to consider as part of their natural threat and
vulnerability management solution. His knowledgeable recommendations and
explanation of key facts are a must-know for all organizations looking to
protect their business.
************************************************************
SHARK BAIT OF THE DAY
_____________________
Maternity matters
One of our programmers became pregnant. With many months before she was due to
go out on maternity leave, a message was sent to India: Send us a programmer!
Said programmer arrives and gets to work, talking with the current programmer
and getting up to speed so she can take over the project. During one lull while
waiting for a compile to complete, the two women started chatting ...
http://cwflyris.computerworld.com/t/4972740/283856143/188892/0/
SEEKING THE VERY BEST IT LEADERS
________________________________
Now's your chance to nominate a worthy CIO or other top IT executive for a
Premier 100 IT Leader award. Computerworld has launched its annual search for
technology professionals who have demonstrated leadership through the use of IT
and have the strategic vision to align technology with business goals. Nominate
an IT Leader today! Nominations are open through June 1 at
http://cwflyris.computerworld.com/t/4972740/283856143/183552/0/
(Send questions to premier100@computerworld.com.)
NEW COMPUTERWORLD JOB BOARD
______________________________
Search multiple listings now and get new job alerts as they are posted.
http://cwflyris.computerworld.com/t/4972740/283856143/156832/0/
COMPUTERWORLD ON TWITTER
________________________
Are you a Twit? So are we! Follow the Computerworld editors at Twitter to hear
what's coming, what's breaking, what's hot, what's not. Plus: Talk back to us
via @computerworld
http://cwflyris.computerworld.com/t/4972740/283856143/126780/0/
___________CONTACTS/SUBSCRIPTIONS___________________________
FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our
online customer service group at online@computerworld.com.
Please include your subscriber e-mail address in all
correspondence: austinames2008.pcmag@blogger.com
ADVERTISING
-----------
For information on advertising, contact
Sean_Weglage@computerworld.com.
PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://cwflyris.computerworld.com/t/4972740/283856143/72509/0/
SUBSCRIPTION SERVICES
---------------------
You are currently subscribed to computerworld_security as: austinames2008.pcmag@blogger.com.
To change your e-mail address or subscription preferences, go to:
http://cwflyris.computerworld.com/t/4972740/283856143/72510/0/
To unsubscribe from this newsletter, go to:
http://cwflyris.computerworld.com/t/4972740/283856143/131135/0/?90482085=aHR0cDovL2N3Zmx5cmlzLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9MjgzODU2MTQzLjkxNTdjODA3NmYzMDhkM2VmNzI4ODkwMTQwZWI4ZjI0Jm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz00OTcyNzQw&x=35fb72ce
If the above URL is not enabled as a link, please copy it in to your
browser window to access our Subscription Page.
Did you know Computerworld has 46 other e-mail newsletters that may be
of use to you? go to the following URL to find out more...
http://cwflyris.computerworld.com/t/4972740/283856143/72511/0/
Copyright 2009
Computerworld Inc.
1 Speen Street
Framingham MA 01701
No comments:
Post a Comment