Tuesday, January 27, 2009

After McColo takedown, spam surges again; 10 Tips for creating your own small hackers group

Spammers have regrouped and are finding ways to send more junk mail
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by AMD
rule

The Green Advantage
Most companies get into green IT for the lower electricity bills. But many organizations are finding that green IT initiatives can also be a meaningful source of real competitive advantage. Find out about four ways green IT is giving businesses an edge in today's tough marketplace.

rule

Spotlight Story
After McColo takedown, spam surges again

By Jeremy Kirk
Spammers have regrouped and are finding ways to send more junk mail despite recent efforts by security experts. Read full story

Related News:

Enjoy lower spam levels while they last It's kind of like the "war on drugs": Lock up one dealer and it's not long before another seizes the business opportunity.

Networking Geek to Geek with Jimmy Ray Purser: 10 Tips for creating your own small hackers group 1. Be of like interest. 2. Keep it small. 3. Define an objective.  More tips.

Advice to the next Homeland Security CPO If you had a chance to pose any question to the person in charge of protecting Americans' privacy as the U.S. Department of Homeland Security executes its mission, what would you say? I had that chance this month when Hugo Teufel, departing chief privacy officer at the DHS, delivered an address, entitled "Reflections on My Time as DHS CPO of the War on Terror," to the Twin Cities Privacy Retreat.

Gemalto warns against dangerous IT security complacency Digital security firm Gemalto has warned of the risks of the common complacency, across the Asia Pacific, about internet security, despite it being a 'hot region for phishing attacks'.

Data Breach at Heartland May Be Bigger Than TJX's A data breach disclosed last week by Heartland Payment Systems Inc. may displace the one revealed by The TJX Companies Inc. in January 2007 as the largest compromise of payment card information to date.

Windows 7 Security Features Get Tough Two years after Windows Vista debuted, many companies have yet to upgrade. And in many instances their reluctance to migrate to Vista stemmed from concern about security.

New Apple Trojan slays Adobe pirates The Trojan that was being distributed last week in pirated copies of Apple's iWork 09 program on BitTorrent has reappeared only days later hiding inside copies of Adobe Photoshop CS4.

Reflex offers secure virtual systems management Reflex Security updates its name to Reflex Systems, combines virtual security technology with new virtual systems management tools.

Exploring Disaster Recovery Options Now that my disaster recovery budget for 2009 has been wiped out, I'm trying to find some kind of replacement that won't cost any money upfront. I can't in good conscience sit idly by while we roll out critical services without the safety net of DR -- that's like watching a friend drive without a seat belt. Maybe there's a very good chance that nothing bad will happen, but if something does go wrong, the consequences can be so severe that the overall risk is beyond acceptance.

Enjoy lower spam levels while they last It's kind of like the "war on drugs": Lock up one dealer and it's not long before another seizes the business opportunity.

Author Expert: Scott Hogg: Practical BGP security While you wait for the slow-moving big wheels of the Internet to move we need to have some way of protecting ourselves from the current set of threats. Fortunately, there are many things you can do to secure your BGP connections.

Enable BIOS Passwords for Extra Security Your PC likely asks for your username and password to grant access to Windows, a nice security measure, but ineffective if someone has physical access to your hard drive. (They'll just install it in another PC and boot from a different disk.) You should enable hard drive encryption for the best protection against data thieves. But also use additional BIOS tricks enable more layers of security, asking for another password to boot, access the drive, or change BIOS settings. Here's how to adjust those system settings.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusua.

Sponsored by AMD
rule

The Green Advantage
Most companies get into green IT for the lower electricity bills. But many organizations are finding that green IT initiatives can also be a meaningful source of real competitive advantage. Find out about four ways green IT is giving businesses an edge in today's tough marketplace.

rule

HP Logical Servers
Make your datacenter infrastructure more adaptive with logical server technology. Find out how you can simplify routine tasks and create more efficiency within your datacenter.
Learn more


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/27/09

Today's most-read stories:

  1. Downadup/Conflicker worm: When will the next shoe fall?
  2. iPhone to get global flat-fee voice service
  3. Windows 7: the untold story of how the enterprise gets snubbed
  4. Open source identity: Linux founder Linus Torvalds
  5. FAQ: How to protect your PC against the Downadup worm
  6. Brocade's new CTO takes aim at Cisco
  7. Heartland tries to rally industry in wake of data breach
  8. IBM confirms layoffs
  9. Apple puts iPhone Nano and Netbook rumors to rest
  10. Microsoft 'can't imagine' PS3 catching up to Xbox 360


MOST DUGG STORIES


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment