Wednesday, March 18, 2009

Consumer groups launch badware-busting community; Web inventor Berners Lee conned by fake Web site

Hacked road signs is the latest incident in spate of mischief nationwide
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by IBM
rule

IBM Sponsored by IBM(R) Rational(R) AppScan
Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities. Download a free trial of AppScan and see how it can help prevent against the threat of attack.

rule

Spotlight Story
Consumer groups launch badware-busting community

Robert McMillan By Robert McMillan
The people behind StopBadware.org have launched a Web site where ordinary people can band together to fight computer viruses and adware. Read full story

Related News:

Web inventor Berners Lee conned by fake Web site In a classic example of an invention turning on its inventor, Web pioneer Sir Tim Berners Lee, has admitted being conned out of his money by an Internet fraudster.

Road signs hacked in NYC Electronic road signs in downtown New York City were broken into over the weekend and instead of telling drivers to go slowly next to a Houston Street construction site, they flashed prankster messages such as "New York is dying," according to a report from The New York Post.

Waledac bot pitches nearby terrorist bombing to dupe users Hackers trying to trick users into downloading the Waledac Trojan are customizing their bait to the recipient's location, a security researcher said Tuesday, upping the social engineering ante yet again.

Cybersquatting Still Lucrative in Bad Economy Unlike many economies around the globe, the criminal industry of cybersquatting and brand abuse saw no downturn in 2008.

Bomb hoax news fed to users after IP analysis Criminals are trying to trick users into downloading malware by luring them to a Web site that reports a hoax breaking news' story of a bomb explosion cleverly tailored to their location.

5 Things You Can't See on Your Network Networks today are blind. As analyst firms such as Gartner have pointed out, IT doesn't really know which users are on the network. Similarly, IT knows very little about the application traffic on the LAN.

SonicWall security devices embrace 802.11n SonicWall's unified threat management gear has embraced 802.11n wireless networks via a software upgrade and a new wireless controller under its Clean Wireless architecture, which scans for malicious traffic as it enters business networks from mobile devices.

Survey: Families wise up to importance of online safety Children admit sneaking in more time online than their parents know about, but families overall are getting more savvy about Internet safety, according to a new survey commissioned by Symantec.

China Mobile ordered to crack down on mass SMS ads Beijing has ordered China Mobile to crack down on mass text message spam and the sale of mobile phone numbers to advertisers after a media report showed the long-standing problems have survived efforts to stamp them out.

Leaked Comcast User Data Found Online Comcast has suffered a leak in its user data that went undetected for more than two months. And it was an alert PC World reader who helped uncover the leak, when a document containing 8,000 e-mail accounts and passwords was found on Scribd.com, according to the New York Times.

Safe job searching Are you on the lookout for IT work? If so, beware of identity thieves who are seizing upon the bad economy to scam job seekers, warns the Identity Theft Resource Center. The organization offers advice for online job searching.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by IBM
rule

IBM Sponsored by IBM(R) Rational(R) AppScan
Failure to properly secure Web applications significantly impacts your ability to protect sensitive client and corporate data. IBM Rational AppScan is an automated scanner that monitors, identifies and helps remediate vulnerabilities. Download a free trial of AppScan and see how it can help prevent against the threat of attack.

rule

Optimizing Systems Management.
IT professionals will realize lower costs and simplified management with a systems management appliance. Appliance-based systems should include: Comprehensive inventory support, secure application distribution, application usage monitoring and robust reporting. Find out if an appliance-based system is right for your organization today.
Download this whitepaper today.


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.

 

03/18/09

Today's most-read stories:

  1. A 10-piece sampler from Microsoft's patent pipeline
  2. Cisco busts out beyond blade servers with Unified Computing System
  3. Cisco says it considered HP, IBM for blade server
  4. Kraken the botnet: The ethics of counter-hacking
  5. Sony resists PlayStation 3 price cut
  6. Could Cisco and BMC become more than partners?
  7. 10 iPhone apps that could get you into trouble
  8. Cisco as underdog
  9. Spam delivers fake news of bomb blast as lure to malicious code
  10. Computer science major is cool again
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment