Monday 18 April 2011

Vengeful programmer gets two years in prison for botnet attack

Apple patches Pwn2Own, Comodo hack bugs | First Look: Norton 2012

Network World Security

Forward this to a Friend >>>


Vengeful programmer gets two years in prison for botnet attack
Putting a finishing punch on what was a nasty online retribution attack, a federal court in New Jersey has sentenced a former programmer to two years in prison, plus three years of supervised release for building a botnet-based virus that infected about 100,000 PCs and attacked a number of media outlets such as Rolling Stone and Radar. The programmer, Bruce Raisley was convicted of launching a malicious... Read More


WHITE PAPER: Dell

Elements of a Proactive Data Security Solution
See all the survey results along with more data security resources, including an expert Webcast outlining six vital security steps, in the security KnowledgeVault. Learn more.

WHITE PAPER: Dell

How to Choose a Qualified Security Assessor
The selection of a Quality Security Assessor (QSA) will have a long and lasting impact on security and compliance for companies subject to PCI DSS compliance. This paper highlights guidelines for choosing a QSA firm in light of new regulations and refinements of PCI DSS v2.0. Learn more.

Apple patches Pwn2Own, Comodo hack bugs
Apple today patched bugs in iOS and Safari used at last month's Pwn2Own hacking contest by three teams of researchers who collectively earned $45,000 for their work. Read More

First Look: Norton 2012
Looking to bolster its intrusion-prevention capabilities Symantec today announced the beta versions of its 2012 editions of its consumer-focused Windows-based security products, Norton AntiVirus and Norton Internet Security. Read More


WHITE PAPER: Sophos

Attack of the PDF Documents
The PDF standard now supports JavaScript, along with tighter connections into user systems from the Adobe Reader program. This makes it very easy for virus writers to utilize scripting within PDF documents and security holes in the Reader software to load malware code and deliver this code onto computers. Read more

Survey says: You're at risk
It's survey week here at the Internet home of secure identity -- two different surveys popped into my inbox. Today's results are from a risk management survey given to about 1,250 IT decision-makers at large enterprises. Read More

SCO Unix's long, strange trip, unbelievably, continues
The story of SCO and Unix gets a little surreal after a while, but news this week that a Utah-based company bought the rights to the company's Unix assets, at least could be a positive for its beleaguered customers. Read More


WHITE PAPER: Aerohive

A Practical approach to Wireless 2.0
Creating "Wi-Fi that works" is a tall order given the breadth of client and application types, the speed and complexity of 802.11n, high-density environments, etc., controller-based vendors cannot live up to their promises of Ethernet-like determinism. Read now!

Europe moves to give consumers control of online advertising
More companies that advertise on the Internet in Europe will give consumers the option to turn off advertisements that collect data on their audiences ahead of European Union regulations soon to come into effect. Read More

Truste wants to add tracking in IE9?
Truste, a company focused on protecting online privacy and security, is defending itself against complaints from a privacy group about its role in the creation of a Tracking Protection List (TPL) for users of Microsoft's Internet Explorer 9 Web browser. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Internet2's Top 10 firsts and other achievements
As Internet 2 celebrates its 15th anniversary, here are 10 major achievements and firsts.

MOST-READ STORIES

  1. Asia out of IPv4 addresses
  2. Four things RIM's PlayBook got wrong
  3. Six Windows 7 nightmares (and how to fix them)
  4. Computer factories eat more energy than the devices they build
  5. Hacker 'handshake' hole found in common firewalls
  6. OpenFlow opens new doors for networks
  7. Red Hat becomes cloud service provider
  8. 10 must-have utilities for small networks
  9. Berners-Lee: Web access is a 'human right'
  10. Did you hear about the hacker who stole the open source code?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment