Tuesday, August 16, 2005

Today's News: Multiple worms target Plug and Play

SearchSecurity.com: Security Wire Daily
Breaking security news, the latest industry developments and trends
August 16, 2005
___________________________________

ISSUE SPONSORED BY: Responding to Virus Threats on Zero-Day

.....................................................................

IN THIS ISSUE

-- NEWS: More malcode targets Windows Plug and Play flaw
-- NEWS: Reduce risks of disaster recovery testing
-- NEWS: Spending too much on compliance? IT can cut costs
-- POLL: Can you define the term 'hacker'?
-- EXPERT WEBCAST: Insider's guide to Web server security
-- POP QUIZ: Web Security School Lesson 1

HEADLINES
---------------------------------------------------------------------

NEWS: MORE MALCODE TARGETS WINDOWS PLUG AND PLAY FLAW
Zotob is up to three variants -- one of which can spread by e-mail --
and exploit watchers are finding more malcode targeting the Plug and
Play flaw. Smarter patching seems to have dulled the impact so far.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1116037,00.html?track=NL-102&ad=525659

MORE INFO:

Find out how Zotob began
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1115620,00.html?track=NL-102&ad=525659

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

Responding to Virus Threats on Zero-Day

New, rapidly deploying viruses provide you with zero days to
understand them and deploy a new virus signature to detect them. How
can you respond adequately to such speed to avoid serious
consequences for your business? Download the latest CipherTrust white
paper to better understand the immediate steps needed to prevent
Zero-Day attacks from causing serious disruption.
Click here:
http://ad.doubleclick.net/adi/ssec/em;pos=2;gci=525659;sz=1x1;ord=348600239?tt=1

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

NEWS: REDUCE RISKS OF DISASTER RECOVERY TESTING |
SearchDataCenter.com
Untested business continuity plans can leave organizations in a
lurch. But taking down live environments is risky and complicated.
New software could ease the burden and allow companies to test more
often.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1115965,00.html?track=NL-102&ad=525659

NEWS: SPENDING TOO MUCH ON COMPLIANCE? IT CAN CUT COSTS |
SearchCIO.com
When it comes to SOX pains, a new survey says more companies should
turn to IT for a remedy.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1116032,00.html?track=NL-102&ad=525659

ALSO ON SEARCHSECURITY.COM
---------------------------------------------------------------------

POLL: CAN YOU DEFINE THE TERM 'HACKER'?
How would you define a "hacker"? Take our minipoll and Sound Off with
your own definition. And watch for James Foster's comedic take on
that topic this Thursday.
http://searchsecurity.techtarget.com/news/0,289141,sid14,00.html?track=NL-102&ad=525659
Sound Off!:
http://discussions.techtarget.com/webx?replyToMessage@@.1dd069dc!action=postNew&setContentUrl=1

EXPERT WEBCAST: INSIDER'S GUIDE TO WEB SERVER SECURITY
Listen to this on-demand webcast from Lesson 1 of Web Security School
and hear Michael Cobb, author of "IIS Security," lay the groundwork
for locking down a Web server before it goes live.
http://searchSecurity.com/r/0,,44512,00.htm?track=NL-102&ad=525659&webschool1
Web Security School:
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1080309,00.html?track=NL-102&ad=525659

POP QUIZ: WEB SECURITY SCHOOL LESSON 1
Which of the following is not considered a strong password?
a. WfgHLm94SED
b. xD$8sf!H
c. 9Q-^g4FP7
d. P3t3rWh!t3
e. They are all strong passwords.
Answer:
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1094981,00.html?track=NL-102&ad=525659
Take the full quiz:
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1094980,00.html?track=NL-102&ad=525659

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:gderussy@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:cferraro@techtarget.com


---------------------- FREE E-NEWSLETTERS! ----------------------
SearchSecurity: Network Security Tactics
SearchSecurity: Compliance Counselor
SearchSecurity: Threat Monitor

Click here to subscribe:
http://searchSecurity.techtarget.com/tieredRegPage?track=NL-102&ad=525659&val=0&newsletters=796243&newsletters=796254&newsletters=1071165&email=pet.computter@gmail.com

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by SearchSecurity.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Security Wire Daily":

Go to unsubscribe: http://SearchSecurity.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=525659&track=NL-102

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494