Monday, August 29, 2011

Morto worm exploits weak passwords on Windows

Computerworld Security: August 29, 2011
===============================================================

Morto worm exploits weak passwords on Windows

A new Windows worm is working its way through company networks by taking
advantage of weak passwords, security researchers said over the weekend.
http://cwonline.computerworld.com/t/7528881/818816221/527727/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Riverbed~~~~~~~~~~~~~~~~~~~~~

Case Study: Boston College

Read this case study to learn how Boston College has reduced complexity of the
backup process for over 1,700 seats by centralizing management.

http://cwonline.computerworld.com/t/7528881/818816221/527728/0/?3e076d18=am9uc2FuMzUxMUBnbWFpbC5jb20%3d&x=cc6c25bd

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. IT Blogwatch: Morto worm spreading fast via RDP
http://cwonline.computerworld.com/t/7528881/818816221/527729/0/

2. DHS warns that Irene could prompt phishing scams
http://cwonline.computerworld.com/t/7528881/818816221/527730/0/

3. China yanks video that leaked hacking tool
http://cwonline.computerworld.com/t/7528881/818816221/527731/0/

4. Dr. Jekyll and Mr. Hyde: Managing online indulgence
http://cwonline.computerworld.com/t/7528881/818816221/527732/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Websense, Inc.~~~~~~~~~~~~~~~~~~~~~

Unified Content Security Defined

In particular, this paper defines a unified content security solution as one
that has a unified architecture, consisting of unified content analysis, a
unified platform, and unified management capabilities. A detailed explanation is
provided for each of these components and the individual elements that comprise
them.

http://cwonline.computerworld.com/t/7528881/818816221/527733/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IT Blogwatch: Morto worm spreading fast via RDP

A new and virulent worm, dubbed Morto, has raised its ugly head on the
Internet. It's spreading quickly, through the Microsoft Windows Remote Desktop
Protocol (RDP). Thought the days of worms such as Blaster and Code Red were
long gone? Think again. In IT Blogwatch, bloggers get all nostalgic.

http://cwonline.computerworld.com/t/7528881/818816221/527729/0/

DHS warns that Irene could prompt phishing scams

As Hurricane Irene barrels toward the eastern seaboard, the U.S. Department of
Homeland Security is warning government agencies and private companies to be on
the lookout for storm-related phishing attacks and other malicious
cyberactivity.
http://cwonline.computerworld.com/t/7528881/818816221/527730/0/

~~~~~~~~~~~~~~~~~~~WEBCAST: Cymphonix~~~~~~~~~~~~~~~~~~~~~

Strategies Behind Managing Internet Traffic

At a time when the number of Internet-connected applications is exploding, now
more than ever IT needs maximum visibility into each and everyone of these
connections.

http://cwonline.computerworld.com/t/7528881/818816221/527734/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

China yanks video that leaked hacking tool

The state-run China Central Television network has yanked a video that
inadvertently included a short clip of a cyber-attack tool targeting Falun Gong
websites.
http://cwonline.computerworld.com/t/7528881/818816221/527731/0/

Dr. Jekyll and Mr. Hyde: Managing online indulgence

I recently read an intriguing Harvard Business Review blog post, The Three Ps of
Online Indulgence, by Alexandra Samuel. This guidance begins with the topic of
well-known adults displaying split personalities online. While their public
activities follow socially accepted norms, their darker "shadow selves" behave
very differently. Samuel's witty analysis artfully exposes the online hypocrisy
of certain family-values politicians and the now-famous tweets of Congressman
Anthony Weiner.
http://cwonline.computerworld.com/t/7528881/818816221/527732/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Computerworld's IT Careers Special Report: What's the IT job market look like?

The editorial department of Computerworld is preparing a special report on IT
careers, and we're interested in your feedback.

This short survey contains fewer than 10 questions about your IT career plans
and job search status and your predictions for the future of the IT profession,
plus demographic questions, and takes less than 10 minutes to complete.

Click here to take the survey: http://cwonline.computerworld.com/t/7528881/818816221/525081/0/

Results of this survey will be part of the December 19 special report on IT
careers.



COMPUTERWORLD'S 2012 PREMIER 100 IT LEADERS AWARDS

Know an IT leader? Now's your chance to get a worthy CIO or other top IT
executive at your company (or client or partner companies, in any industry)
nominated for the 2012 Premier 100 IT Leaders awards. Computerworld has launched
its annual search for technology professionals who have demonstrated leadership
in their organizations through the use of IT and have the strategic vision to
align technology with business goals.

Nominations are being collected now through August 31. Nominate someone today!

http://cwonline.computerworld.com/t/7528881/818816221/510553/0/


CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Can Apple maintain its mojo without Steve Jobs at the helm?

http://cwonline.computerworld.com/t/7528881/818816221/527522/0/

SHARK TANK OF THE DAY
______________________

What were the odds of THAT happening?

This pilot fish is a programmer trainee at a Las Vegas casino that has just
hired its first IT director. And the guy just happens to be friends with the new
VP of finance. How likely is it that he has any real IT background?

http://cwonline.computerworld.com/t/7528881/818816221/527604/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7528881/818816221/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7528881/818816221/311619/0/

Facebook: http://cwonline.computerworld.com/t/7528881/818816221/311620/0/

Twitter: http://cwonline.computerworld.com/t/7528881/818816221/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7528881/818816221/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjIxLjRhYjhkNzUwOWY0NGExODFmZDY2YmZlOGMyNDBhMjllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03NTI4ODgx&x=2591781c

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7528881/818816221/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7528881/818816221/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7528881/818816221/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:22 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive