Wednesday, February 18, 2009

Spammers break Hotmail's CAPTCHA yet again; Facebook CEO Calms Privacy Fears Over TOS Change

The battle by Microsoft to secure its Live Hotmail system from spammers appears has failed yet again
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Spotlight Story
Spammers break Hotmail's CAPTCHA yet again

By John E. Dunn
The battle by Microsoft to secure its Live Hotmail system from spammers appears to have failed yet again with the news that the latest version of its CAPTCHA authentication system has been broken. Read full story

Related News:

Facebook CEO Calms Privacy Fears Over TOS Change Who owns and controls your Facebook information? This has been a question many have debated over the weekend, but Facebook CEO, Mark Zuckerberg, finally gave us the answer (almost) Monday.

Where Are the Feds on Cybersecurity? A couple of recent events have shown how purposefully useless the U.S. government is with regard to cybersecurity. Every so often, the FBI parades some success stories through the media. Unfortunately, what's behind them are prosecutions for show rather than true demonstrations of tackling cybercrime.

Norton Online Family gives parents new tools to monitor kids Symantec is introducing Norton Online Family, software for the PC and Mac intended to give parents a way to keep track of what their children are doing online via up to five household PCs and a cloud-based analysis service that provides reports.

ConSentry upgrades its threat engine ConSentry's new software for its intelligent switches adds a permanent agent for assessing endpoint security and can assess what Windows operating system patches have been applied.

Fortinet wheels out Web application firewall Fortinet's security appliance offloads processing of SSL and XML traffic from Web servers.

Altor tracks virtual machines in motion Altor Networks' firewall software for virtual environments now supports a unique identifier to track particular versions of virtual machines.

Recession Makes IAM More Important Than Ever Any economic downturn brings new risks to your organization. Nervous employees who fear downsizing may be tempted to gain unauthorized access to sensitive information stored across applications while temporary workers are less loyal and identity verification processes for full-time employees may not be used, making your organization more susceptible.

Change we can count on" with Obama Cyber Security Review. (just kidding) Cisco Subnet blogger Larry Chaffin reports that On Feb. 9 President Obama ordered an immediate 60-day review of the U.S. government's cybersecurity plans.

Obama’s Electronic Health Records initiative could usher in a new wave of ID theft With the stimulus bill all but signed it looks like the government will be handing out $19 billion in an effort to digitize America’s health record system and security blogger Jamey Heary foresees trouble.

How safe is outsourcing your network? Cisco Subnet blogger Larry Chaffin tells of a frightening story of an outsourcer's lax staffing policies.

Cisco Adds Features to Firewall Services Module February 9, Cisco released Firewall Services Module (FWSM) software for the 6500 switch and Cisco Subnet blogger Scott Hogg explains the new features.

Blue Gears - DMZ w/5 Physical NICs with VMware ESX Cisco Subnet blogger Edward Haletky says that virtualization hosts with only 5 pNICs who want to include a DMZ and other networks present a challenge and face a performance vs. security trade-off.

Career Transition: From Public Sector to Private Moving from the public sector to a private sector security job can be a huge leap. David Quilter points out the strengths you'll bring along with the skills you may need to develop. Excerpted from From One Winning Career to the Next, published by the Security Executive Council and available through their online store.

Mozilla confirms 'showstopper' bug in mobile browser preview Mozilla has acknowledged that a "showstopper" bug makes the first preview of its browser for Windows Mobile-powered cell phones "bascially useless" to many users.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Juniper Networks
rule

Expert advice on improving a data center
Discover how to significantly simplify your data center architecture while containing costs and improving efficiency and reliability. On March 12, data center design and implementation experts will share in-depth advice on new approaches and examples of deployments - including price, performance and savings. Register for this Live Webcast now.

rule

Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/18/09

Today's most-read stories:

  1. Vodafone to sell second HTC Google phone
  2. 9 dirty tricks: Social engineers' favorite pick-up lines
  3. Microsoft announces $250,000 Conflicker worm bounty
  4. Huawei unveils first Android smartphone
  5. How to build your own supercomputer
  6. Largest coordinated ATM rip-off ever nets $9+ million
  7. Palm pulls the plug on Palm OS, bets the future on Pre's webOS
  8. Alcatel-Lucent founds 4G industry group
  9. Tweet to compete
  10. Managing network change in a down economy


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment