Posted by: paragon | April 15, 2009

Twitter Worm Attack Continues: Here’s How to Keep Safe

All the week’s news and views about Security, 04/14/09
Twitter Worm Attack Continues: Here’s How to Keep Safe
http://www.networkworld.com/nlsecuritynewsal191582
The malicious worm affecting Twitter over the weekend has now
mutated and continues to invade the popular micro-blogging
network. Although Twitter is taking action against the problem,
security analysts fear that further mutations of the worm will
continue to wreak havoc on the network over the week.Read full
story  http://www.networkworld.com/nlsecuritynewsal191582
Senior Editor Ellen Messmer covers security for Network World.
E-mail Ellen mailto:emessmer@nww.com .
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
Network Management Solutions in your backyard. Answers are as close
as the IT Roadmap event in your area. You can ask questions,
compare quotes, and gain a year’s worth of direction in less than a
day. Coming to 10 cities in ’09 including Boston in May and Atlanta
in June. Qualify to attend free at
http://www.nww.com/rpgx.jsp?c=XU1PTB1012Z4303.
_______________________________________________________________
RELATED EDITORIAL LINKS
Twitter wrestles with fourth worm attack
http://www.networkworld.com/nlsecuritynewsal191583  Another worm
attack early Monday on Twitter kept the micro-blogging Web
service chasing down infected accounts and deleting rogue
tweets.
Weekend worms strike Twitter, teen admits responsibility
http://www.networkworld.com/nlsecuritynewsal191584  Twitter was
hit with at least three different worm attacks that started
Saturday and continued into Sunday, the micro-blogging service
acknowledged as it promised users it would review its coding
practices.
1 in 5 Windows PCs still hackable by Conficker
http://www.networkworld.com/nlsecuritynewsal191585  Although the
media blitz about the Conficker worm prompted a significant
number of enterprise users to finally fix a six-month-old
Windows bug, about 1 in 5 business computers still lack the
patch, a security company said Monday.
Botlab keeping an eye on spamming botnets
http://www.networkworld.com/community/node/40855  University of
Washington researchers have developed a prototype system called
Botlab that monitors botnets to gain insight into a major
generator of spam.
Does Social Networking Require User Policy Changes?
http://www.networkworld.com/nlsecuritynewsal191586  IT security
administrators have had a fairly easy case to make against such
social networking sites as Myspace in the past. Myspace in
particular tends to be a place for the mostly personal, and some
profiles are simply front companies for online mobsters and
malware pushers.
PCI security rules may require reinforcements
http://www.networkworld.com/nlsecuritynewsal191587  The PCI
standard, long touted as one of the private sector’s strongest
attempts to regulate itself on IT security, is increasingly
being slammed by critics who claim that the rules aren’t doing
enough to protect credit and debit card data.
Can the status quo threaten your LAN?
http://www.networkworld.com/nlsecuritynewsal191588  In times of
economic crisis people tend to seek the safety and security of
the status quo. “Doing what you’ve always done, and what
everyone else is doing, is the most prudent course,” goes the
thinking.
Security Tops IT Budget Priorities
http://www.networkworld.com/nlsecuritynewsal191589  Security is
on the minds of American companies and many are still making
room in their budgets to invest in IT security initiatives,
according to a survey released Monday by Robert Half Technology.
Trend Micro dishes out security smorgasbord
http://www.networkworld.com/nlsecuritynewsal191590  Trend Micro
Monday dished out a smorgasbord of endpoint security products
that put the focus on Trend’s cloud-based architecture and its
partnership with systems-management vendor BigFix.
RSA upgrades data leak prevention suite
http://www.networkworld.com/nlsecuritynewsal191591  EMC’s RSA
division Monday announced an upgraded version of its data-leak
prevention suite, adding over twenty policy templates for
recognizing personal identifiable information in countries
around the world, including Spain and New Zealand.
Podcast: Prepping for Tougher Health Data Rules
http://www.networkworld.com/nlsecuritynewsal191592  As part of
the recent stimulus bill, the HITECH Act will create standard
electronic health records for every American by 2014, as well as
introduce strict new rules for the protection of these health
records. John Linkous from eIQnetworks discusses the components
of the act and how IT can start preparing now for the new
standards. (10:12)
User education key to IT security: Microsoft
http://www.networkworld.com/nlsecuritynewsal191593  With the
release of its latest Security Intelligence Report, Microsoft is
encouraging its partners and customers to become more security
aware and educated, as new attack tactics are on the rise.
Top Trends: Patch Management
http://www.networkworld.com/nlsecuritynewsal185732  Find out how
patch-management products work, and what they can do for you, in
this Product Guide.
April giveaways http://www.networkworld.com/community/node/40434
galore
Cisco Subnet http://www.networkworld.com/subnets/cisco/
andMicrosoft Subnet
http://www.networkworld.com/subnets/microsoft/  are giving away
training courses from Global Knowledge, valued at $2,995 and
$3,495, and have copies of three hot books up for grabs:CCVP
CIPT2 Quick Referenceby Anthony Sequeira,Microsoft Voice Unified
Communicationsby Joe Schurman andMicrosoft Office 2007 On
Demandby Steve Johnson.Deadline for entries
http://www.networkworld.com/community/node/40434  April 30.
Network World on Twitter  http://twitter.com/NetworkWorld  Get
our tweets and stay plugged in to networking news.
TOP STORIES | MOST DUGG STORIES
       http://www.networkworld.com/nlsecuritynewsal191594
1. Conficker awakens, starts scamming
       http://www.networkworld.com/nlsecuritynewsal191595
2. Microsoft eating up U.S. and global netbook markets
       http://www.networkworld.com/nlsecuritynewsal191596
3. Bill would give Obama power to shut down Internet
       http://www.networkworld.com/nlsecuritynewsal191597
4. Are you an IT geezer? (and we mean that in a good way)
       http://www.networkworld.com/nlsecuritynewsal191598
5. A Twitter virus shows up: StalkDaily
       http://www.networkworld.com/nlsecuritynewsal191599
6. The 10 worst Microsoft product names of all time
       http://www.networkworld.com/nlsecuritynewsal191600
7. Netbook computers spark corporate interest
       http://www.networkworld.com/nlsecuritynewsal191601
8. Conficker, the Internet’s No.1 threat, gets an update
       http://www.networkworld.com/nlsecuritynewsal191602
9. The implications of Skype’s free software application for
iPhone  http://www.networkworld.com/nlsecuritynewsal191603
10. Fear and loathing in Windows 7: Testing Branch Cache using
Linux   http://www.networkworld.com/nlsecuritynewsal191604
MOST-WATCHED VIDEO1. Students learn through robot battles
       http://www.networkworld.com/nlsecuritynewsal191605
_______________________________________________________________
This newsletter is sponsored by HP
Storage Virtualization Guide
Check out Network World’s IT Roadmap on Storage virtualization.
Learn how to reduce the complexity of managing, backing up and
archiving data. Learn the differences between the three main
storage virtualization technologies which are in the data path,
out-of band and split path. Find out which technology is best
suited for your environment.
http://adserver.fattail.com/redir/redirect.asp?CID=296189
_______________________________________________________________
ARCHIVE LINKS
Network Security Research Center
http://www.networkworld.com/topics/security.html  : For breaking
security news, news analysis, blogs, newsletters, product tests,
and more.
Security Strategies Newsletter
http://www.networkworld.com/newsletters/sec/index.html  :
Norwich University Associate Professor M. E. Kabay takes the
long view of security issues and resources for ensuring your
network, computer and facilities remain secure. View the archive
and to sign up for the newsletter here
http://www.networkworld.com/newsletters/sec/index.html
_______________________________________________________________
BONUS FEATURE
Accurately Troubleshoot your Apps. Optimize your application
troubleshooting efforts with the best practices described in this
whitepaper, “Application Troubleshooting Guide.” Eliminate finger
pointing between departments. Find out how to isolate the source of
application performance problems and what to look for when
troubleshooting. Get all of the details today.
http://www.nww.com/rpgx.jsp?c=XU1PTA1013Z4161 Download this
whitepaper now.
_______________________________________________________________
PRINT SUBSCRIPTIONS AVAILABLE
You’ve got the technology snapshot of your choice delivered to
your inbox each day. Extend your knowledge with a print
subscription to the Network World newsweekly, Apply today at
http://www.subscribenw.com/nl2
http://www.networkworld.com/nlsecuritynewsal166186
International subscribers, click here:
http://www.subscribenw.com/dp30
https://www.subscribenww.com/cgi-win/nww.cgi?paid&p=ADP608NW
_______________________________________________________________
ParagonHost
The Spam Busters
Virtual Graffiti
Advertisements

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Categories

%d bloggers like this: