All supposedly critical. 2 Windows, 1 Exchange. They will require a reboot.
Author: admini
Virus levels remain flat for April
Until now Netsky has remained in the number one spot, demonstrating as SoftScan pointed out in February that users need to check and clean their machines, since the high percentage rate is not down to new infections. However financial motivation has once again proved too much temptation for hackers and phishing is now in the number spot.
Viruses accounted for 0.55% of all email traffic in April. The top five virus families for April were:
1 phishing 42.60%
2 netsky 28.49%
3 mytob 13.24%
4 html.iframe 5.00%
5 nyrem 4.57%
http://www.net4now.com/isp_news/news_article.asp?News_ID=3561
FCC adtops order to enable law enforcement to access certain broadband and VoIP providers
The record indicates that TTPs are available to provide a variety of services for CALEA compliance to carriers, including processing requests for intercepts, conducting electronic surveillance, and delivering relevant information to LEAs. Fifth, the Order restricts the availability of compliance extensions under CALEA section 107(c) to equipment, facilities and services deployed prior to October 25, 1998 and clarifies the role and scope of CALEA section 109(b), under which carriers may be reimbursed for their CALEA compliance costs. Seventh, the Order concludes that carriers are responsible for CALEA development and implementation costs for post-January 1, 1995 equipment and facilities, and declines to adopt a national surcharge to recover CALEA costs. -FCC-
http://www.itu.int/osg/spu/newslog/FCC+Adopts+Order+To+Enable+Law+Enforcement+Access+To+Broadband+And+VoIP+Providers.aspx
Survey on Industry Measures taken to comply with National Measures
Guidelines for this directive include:
· There should be an incentive for providers to contribute to the overall security of interconnected networks rather than protecting merely their own resources.
· Providers need to be more proactive and monitor their networks for risks of security breaches. Providers could also be asked to report which networks they monitor.
· This includes guidance to consumers as well as guidance to the provider’s staff, in particular with regard to incident response and emergency planning.
· The need for contact details for email abuse and security violations should also be stressed.
Providers in Europe are more concerned about spam emails that their customers receive than they are concerned with spam that their customers send.
http://www.enisa.eu.int/doc/pdf/deliverables/enisa_security_spam.pdf
CA introduces tape encryption management product
An application program interface (API) is provided to enable third-parties to integrate the solution with their tape management systems. This enables organizations to select the level of encryption that is appropriate for each data set, with the option of not encrypting some data at all. In symmetric cryptography the same key is used to encrypt and decrypt the data, while in asymmetric cryptography a public and private key are used.
http://www.cbronline.com/article_feature.asp?guid=99560C5B-5D86-4768-951A-B296C240152D
Eager IT Leaders Could Swallow Security Industry
“I think some people were still scratching their heads when we bought Authentica, but certainly not our customers,” said Dennis Hoffman, EMC’s vice president of information security for EMC, based in Hopkinton, Mass. “Customers are asking all the major platform providers to build security into their technologies, and we will absolutely invest, partner and when possible, acquire, to continue to build out information security in our own products.”
Hoffman said enterprises will likely always seek some form of help from independent, third-party security applications vendors, but that he believes end users have tired of the need to acquire additional technologies for protecting almost every form of IT.
Some analysts are predicting that the trend toward large IT platform providers developing greater security features will only accelerate a torrent of industry consolidation among anti-malware and network defense applications makers that could already be overdue.
http://www.eweek.com/article2/0,1759,1956656,00.asp?kc=EWRSS03119TX1K0000594