Fake LinkedIn profiles promise pics, send malware instead Hackers have seeded LinkedIn , the business networking service, with bogus celebrity profiles that link to malicious sites serving up attack code, a security researcher said Wednesday. CheckFree warns 5 million customers after hack CheckFree and some of the banks that use its electronic bill payment service are notifying more than 5 million customers after criminals took control of several of the company's Internet domains and redirected customer traffic to a malicious Web site hosted in the Ukraine. Malwarebytes finds pesky Trojan The last Gearhead column wherein Gibbs discovered that his Windows XP machine was acting weirdly generated a huge amount of reader feedback and one recommendation -- using Malwarebytes Anti-Malware -- worked where many others hadn't. Kerio unveils Mac client for its VPN Messaging and security vendor Kerio in March will release a Mac-based VPN client for its WinRoute Firewall. Recession Be Damned! IT Security Spending Up For Some The economy may be in tatters, along with legions of IT security budgets. But a new report from Forrester Research suggests security spending is actually on the rise in some enterprises. Data breaches rose sharply in 2008, says study More than 35 million data records were breached in 2008 in the U.S., a figure that underscores continuing difficulties in securing information, according to the Identity Theft Resource Center (ITRC). FBI/DOJ warns of economic cybergeddon A couple of speeches this week by FBI and Department of Justice executives are warning that if law enforcement and others connected with keeping the Internet a secure and safe place to do business and socialize the world could be headed toward a cyber-based economic meltdown - cybergeddon. Trend Micro, BigFix integrate antimalware and systems management wares Vendors partner to combine Trend Micro's antimalware and Web protection technologies with BigFix's patch management and security configuration functionality. Securing Virtual Machines Starts With Sound Policies The ease and speed of deploying a virtualized environment has allowed some IT professionals to overlook security concerns that may be brewing up in the cloud. Hong Kong businessman guilty of spam to influence stocks A Hong Kong businessman has recently pleaded guilty for his part in dispatching tens of millions of spam messages to pump up the prices of Chinese stocks between 2004 and 2006. Best practices for removable media encryption USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive corporate information. While IT has responded with policies and audits, the best way to safeguard data taken outside of a managed envrionment is encryption. Cisco changes its docs to reflect that it does support 3rd party VPNs Recently, some network engineers slammed Cisco for what appeared to be a statement that it would no longer support third-party IPsec VPNs. Cisco has since republished all its documentation to state that it does support non-Cisco VPNs. January giveaways from Cisco Subnet and Microsoft Subnet Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here. |
No comments:
Post a Comment