All the week's news and views about Security, 09/22/04
_______________________________________________________________
This newsletter is sponsored by Radware 
Radware DefensePro 3Gbps intrusion prevention switch  

Radware Intrusion Prevention Switch protects against worms, 
viruses, malicious intrusions, Denial of Service attacks and 
Trojans - securing networked applications at 3-Gbps. Featuring 
inline security switching and accelerated, stateful and 
deep-packet inspection, DefensePro isolates attacks and 
dynamically moderates bandwidth to stop propagation across the 
network.Read the Radware DefensePro White Paper at 
http://www.fattail.com/redir/redirect.asp?CID=81201
_______________________________________________________________
DOWNLOAD THE LATEST SPECIAL REPORTS FROM NETWORK WORLD 

Focused reports on compelling industry topics, Network World 
Special Reports are available online at Network World Fusion. 
Network World Special Reports on Mobility, IP Telephony 
Security, the State of Wireless LANs and more are currently 
available. Download any or all of our Special Reports at: 
http://www.fattail.com/redir/redirect.asp?CID=81394
_______________________________________________________________

Network World's Security News Alert

Exploit posted for Microsoft JPEG flaw, 09/21/04

Computer code that takes advantage of a flaw in the way many 
Microsoft applications process JPEG images has been published on 
the Internet and could be a precursor to actual attacks on 
vulnerable PCs, experts said. 
<http://www.nwfusion.com/news/2004/0921exploposte.html?nl> 

Ireland blocks calls to 13 countries to thwart 'Net scam, 
09/22/04

Ireland's telecom regulator said this week that is taking 
"extraordinary" measures to protect Internet users from rogue 
autodialer programs that hijack their modems and run up 
long-distance phone charges by suspending direct dialing to 13 
countries, most of which are South Pacific islands. 
<http://www.nwfusion.com/news/2004/0922irelablock.html?nl> 

AOL, RSA, VeriSign push authentication services, 09/21/04

Responding to a scourge of online fraud and identity theft that 
threatens to undermine public confidence in Internet commerce, 
major companies are rolling out new services to encourage the 
adoption of better technology to identify customers, business 
partners and employees online. 
<http://www.nwfusion.com/news/2004/0921aolrsa.html?nl> 

Review: Endpoint security products aid in client defense, 
09/20/04

We test enterprise endpoint security products from nine vendors: 
eEye Digital Security, Finjan Software, F-Secure. InfoExpress, 
SecureWave, Sygate Technologies, Symantec, WholeSecurity and 
Zone Labs. 
<http://www.nwfusion.com/reviews/2004/0920rev.html?nl> 

Review: Testing Windows XP SP2's role in client security, 
09/20/04

We also reviewed Microsoft's recently introduced Windows XP 
Service Pack 2, which is intended to make the operating system 
more secure. 
<http://www.nwfusion.com/reviews/2004/0920revxp.html?nl> 

Review: Attacking client security: Our strategy, 09/20/04

In order to exercise the endpoint security capabilities of these 
products, we focused on launching attacks that could occur if 
the basic network and machine defenses all have failed. 
<http://www.nwfusion.com/reviews/2004/0920revattack.html?nl> 

Review: Taking the application approach to client security, 
09/20/04

Application control endpoint security products can limit the 
programs that can run on distributed client systems. The three 
products we tested in this category each attempt to solve the 
problem differently. 
<http://www.nwfusion.com/reviews/2004/0920revtest2.html?nl> 

Feds eyeing one access model for all, 09/20/04

A mandate from President Bush has required the entire federal 
government to adopt common technology to be used to identify 
employees and contractors accessing federally controlled 
networks and buildings. 
<http://www.nwfusion.com/news/2004/092004fedsmart.html?nl> 

Weblog: A presidential order on secure identification, 09/20/04

Little noticed in this mud-slinging frenzy of an election season 
is that President Bush late last month signed a presidential 
directive with important technology implications. 
<http://www.nwfusion.com/weblogs/security/006279.html?nl> 

Technology Update: Virtual directories solve identity crises, 
09/20/04

One challenge network administrators face in implementing 
portals or other enterprise applications is that user identity 
is fractured, residing in multiple directories tied to 
individual applications throughout an organization. As a result, 
it is difficult to provide enterprise applications with the 
comprehensive view of users they require to deliver their full 
value. 
<http://www.nwfusion.com/news/tech/2004/092004techupdate.html?nl>

TruSecure merges with Betrusted, 09/20/04

Information security services companies TruSecure and Betrusted 
plan to announce on Tuesday that they have merged, forming a new 
company called Cybertrust. 
<http://www.nwfusion.com/news/2004/0920trusemerge.html?nl> 

Gartner analysts point out the security you don't need, 09/20/04

The plethora of security technologies on the market are enough 
to overwhelm even the most knowledgeable IT managers, but in 
sorting through all of the options, it may be helpful to look at 
what is not needed, according to Gartner research detailed 
Monday in London at its IT Security Summit conference. 
<http://www.nwfusion.com/news/2004/0920gartsec.html?nl> 

Liquid Machines to acquire e-mail company, 09/20/04

In a sign of continued consolidation among security firms, 
Lexington, Mass., Liquid Machines Monday plans to announce the 
acquisition of San Francisco's Omniva. 
<http://www.nwfusion.com/news/2004/0920liquid.html?nl> 

Microsoft provides Office source code to governments, 09/20/04

Facing growing competition from open source software providers, 
Microsoft has decided to allow governments and international 
organizations access to source code for its Office 2003 
productivity suite. 
<http://www.nwfusion.com/news/2004/0920msoffice.html?nl> 

Novell set to advance identity mgmt. package, 09/20/04

Forthcoming enhancements to Novell's identity management wares 
could help users get a better handle on who is on the network 
and what they are doing. 
<http://www.nwfusion.com/news/2004/092004novell.html?nl> 

Management Strategies: Security certification staples, 09/20/04

Digest what some of the most popular IT credentials bring to the 
table. 
<http://www.nwfusion.com/careers/2004/0920man.html?nl> 

Opinion: Controlling the access point signal, 09/20/04

How accurately can the radio signal from an access point (which 
supports attenuation by varying the power output, such as some 
Buffalo access points) be attenuated, contained or controlled? 
<http://www.nwfusion.com/columnists/2004/0920wizards.html?nl> 

Opinion: Protecting a wireless net with RADIUS, 09/20/04

We are getting ready to double our use of wireless networking at 
our company. In doing some research, we have found mentions of 
using RADIUS.  Is that something we should look at? 
<http://www.nwfusion.com/columnists/2004/092004nutter.html?nl> 

Conference focuses on challenges of fighting cybercrime, 
09/17/04

Preserving the digital crime scene poses one of the biggest 
challenges in the global fight against cybercrime, said 
participants this week at a major international conference on 
fighting Internet-based crime. 
<http://www.nwfusion.com/news/2004/0917confefocus.html?nl> 

Arrest made in Cisco source code theft, 09/17/04

Police in the U.K. have arrested a man in connection with the 
theft of source code from networking equipment maker Cisco in 
May, a Scotland Yard spokeswoman confirmed Friday. 
<http://www.nwfusion.com/news/2004/0917arresmade.html?nl> 

Microsoft trials piracy lock on Download Center, 09/17/04

As part of its efforts to combat software piracy, Microsoft is 
testing a new feature on its Download Center Web site that can 
lock out pirated copies of Windows. 
<http://www.nwfusion.com/news/2004/0917microtrial.html?nl> 

Weblog: Some new intrusion-detection resources, 09/17/04

We've added several new tools to the Intrusion detection 
downloads page, including rootkit detectors and forensics tools. 
<http://www.nwfusion.com/compendium/archive/006267.html?nl> 

Audio: Sendmail on e-mail authentication, 09/16/04

E-mail authentication, in one form or another, is coming to an 
inbox near you. Dave Anderson, CEO of Sendmail, joins the 
program to discuss the various authentication proposals - 
SenderID, DomainKeys and Sender Policy Framework - and how his 
company is planning to implement them in both its commercial and 
open source products. 
<http://www.nwfusion.com/research/2004/0916radio.html?nl> 

Netilla SSL device guards one application at a time, 09/16/04

Netilla is introducing a line of Secure Sockets Layer gear that 
protects only one application at a time as remote users access 
servers across the Internet. 
<http://www.nwfusion.com/news/2004/0916netilla.html?nl> 

Symantec to acquire security consultants @Stake, 09/16/04

Symantec has agreed to acquire @Stake, a Cambridge, Mass.-based 
provider of IT security consulting services. 
<http://www.nwfusion.com/news/2004/0916symantoac.html?nl> 

NEC extends quantum cryptography range and speed, 09/16/04

NEC researchers have developed a quantum cryptography system 
with sufficient speed and range to make it commercially viable. 
It could go on sale in the second half of 2005, the researchers 
said Thursday. 
<http://www.nwfusion.com/news/2004/0916necexten.html> 

AOL backs away from Microsoft anti-spam plan, 09/16/04

America Online has decided not to fully support Microsoft's 
Sender ID spam-fighting plan after the IETF and the open- source 
community expressed intellectual property concerns. 
<http://www.nwfusion.com/news/2004/0916aolbacks.html?nl> 

IBM fits PCs with new hardware-based security chip, 09/16/04

IBM has begun using new security hardware from National 
Semiconductor in its desktop PCs in an effort to fend off 
viruses and hackers. 
<http://www.nwfusion.com/news/2004/0916ibmfits.html?nl> 

Newsletter: Digital forensics, Part 1, 09/14/04

A journalist from South Africa recently wrote to me with a 
series of interesting questions about forensics and I had such 
fun answering that I got his permission to post his questions 
and my answers in this column and the next. 
<http://www.nwfusion.com/newsletters/sec/2004/0913sec1.html?nl> 

Newsletter: Digital forensics, Part 2, 09/16/04

A journalist from South Africa recently wrote to me with a 
series of interesting questions about forensics and I had such 
fun answering that I got his permission to post his questions 
and my answers in the last column and this one. 
<http://www.nwfusion.com/newsletters/sec/2004/0913sec2.html?nl> 

Newsletter: Fortinet aims latest VPN boxes at the carrier 
market, 09/16/04

Fortinet is heading into the service provider market with the 
release of two hardware platforms that support network-based VPN 
services as well as provide firewalling and virus protection. 
<http://www.nwfusion.com/newsletters/vpn/2004/0913vpn2.html?nl> 

German IT agency sets record straight on IE, 09/16/04

In response to the growing number of viruses infecting 
computers, a spokesman for Germany's Federal Office for 
Information Security (BSI) has suggested that users consider 
alternatives to Microsoft's Internet Explorer Web browser. But 
the agency did not recommend that users steer clear of Microsoft 
products, the spokesman said, refuting a press release issued 
Tuesday by browser developer Opera Software ASA. 
<http://www.nwfusion.com/news/2004/0916germaitag.html?nl> 

Weblog: VoIP security, 09/15/04

A new guide from NIST discusses the unique issues involved in 
securing VoIP systems. 
<http://www.nwfusion.com/compendium/archive/006253.html?nl> 

Newsletter: VoIP and security, Part 2, 09/15/04

The same areas that are security problems for network security 
can also be problems for VoIP security. 
<http://www.nwfusion.com/nlsecuritynewsal647> 

Newsletter: Cisco adds upgrade feature to IPSec VPN software 
client, 09/14/04

Cisco is updating the software client for its IPSec VPN gear, 
adding features that make it easier to distribute future 
upgrades and to tie the clients to other applications. 
<http://www.nwfusion.com/newsletters/vpn/2004/0913vpn1.html?nl> 

Weblog: Network Intelligence unveils secure array, 09/14/04

Network Intelligence last week announced a secure software 
appliance for companies that need to comply with government 
regulations. 
<http://www.nwfusion.com/weblogs/storage/006248.html?nl> 

IETF deals Microsoft's e-mail proposal a setback, 09/14/04

A proposed technology for identifying the source of e-mail 
messages suffered a blow last week when a group within the IETF 
established to study the proposal sent it back for more work, 
citing concerns over vague intellectual property claims made by 
Microsoft covering some of the technology. 
<http://www.nwfusion.com/news/2004/0914ietfdeals.html?nl>
_______________________________________________________________
To contact: Network World Staff

Senior Editor Ellen Messmer covers security for Network World. 
Contact her at <mailto:[EMAIL PROTECTED]>.
_______________________________________________________________
This newsletter is sponsored by Aventail 
SSL or IPSec--which VPN is Best for you? 

Your users now demand access to more applications, from more 
places, using more devices. For these remote access needs, SSL 
VPNs provide greater security and control, and because they're 
clientless they're less expensive and easier to manage than 
IPSec. Learn more in Aventail's free white paper: "Comparing 
Secure Remote Access Options: IPSec VPNs vs. SSL VPNs."   
http://www.fattail.com/redir/redirect.asp?CID=81414
_______________________________________________________________
ARCHIVE LINKS

Security research center
Latest security news, analysis, newsletters and resource links.
http://www.nwfusion.com/topics/security.html
_______________________________________________________________
FEATURED READER RESOURCE
ACCESS NW'S IN-DEPTH REPORT ON: BLADE SERVERS

Available now is Network World's Technology Insider on: Blade 
Servers. Find out why early adopters of blade server technology 
say the benefits aren't science fiction, how blade servers 
differ by vendor, why blade servers are perfectly suited for 
today's data centers, review our extensive blade server buyer's 
guide and more. Click here:
<http://www.nwfusion.com/nlsecuritynewsal648>
_______________________________________________________________
May We Send You a Free Print Subscription? 
You've got the technology snapshot of your choice delivered 
at your fingertips each day. Now, extend your knowledge by 
receiving 51 FREE issues to our print publication. Apply 
today at http://www.subscribenw.com/nl2

International subscribers click here: 
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail 
newsletters, go to: 
<http://www.nwwsubscribe.com/Changes.aspx> 

To unsubscribe from promotional e-mail go to: 
<http://www.nwwsubscribe.com/Preferences.aspx> 

To change your e-mail address, go to: 
<http://www.nwwsubscribe.com/ChangeMail.aspx> 

Subscription questions? Contact Customer Service by replying to 
this message.

This message was sent to: [EMAIL PROTECTED] 
Please use this address when modifying your subscription. 
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor, 
at: <mailto:[EMAIL PROTECTED]> 

Inquiries to: NL Customer Service, Network World, Inc., 118 
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of 
Online Development, at: <mailto:[EMAIL PROTECTED]> 

Copyright Network World, Inc., 2004

------------------------
This message was sent to:  [EMAIL PROTECTED]

Reply via email to