Search This Blog

Monday, March 16, 2009

DNS bug update; Spot the Tiny Phishing Trick; Identity theft leads to murder

Dan Kaminsky gives DNS bug update, one year later
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Live Webcast: Database Security.
Security and regulatory compliance are not optional despite slashed IT budgets. Join this Live Webcast sponsored by Oracle on Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Register for this Live Webcast now.

rule

Spotlight Story

Dan Kaminsky gives DNS bug update, one year later
About a year ago Dan Kaminsky found a serious DNS bug that threatened the internet. It’s been about 9 months since the patch came out and Kaminsky gave us an update at Boston’s Source conference. Listen now.

Related News:

Spot the Tiny Phishing Trick The TinyURL service allows you to enter a long URL, such as one for a particular Google Maps location, and convert it into a short, easy-to-type or e-mail link. Good for sending links - or as Trend Micro reports, for hiding a malicious Web site URL in a phishing e-mail.

Identity theft leads to murder Identity theft is getting truly nasty. In this case a woman who was apparently breaking into corporate accounts and stealing identities as well as dollars, was killed by three men who wanted her laptop and likely the cash stream the identity thefts were generating.

Bribery case creates possible IT security nightmare in D.C. After being arrested on bribery charges Thursday, the District of Columbia's top information security official is being held without bail, partly because of uncertainty about whether he still has the ability to access the district's IT systems.

FBI probe of Kundra’s former D.C. technology office may widen FBI agents have charged two men, one a staffer in the D.C. IT department run by Vivek Kundra, the Obama administration’s CIO, with bribery, fraud, and money laundering.

Spammers Kick Job Seekers While They Are Down Heary: Yet another malicious e-mail outbreak is soaring around the Internet. This one is specifically targeting those that are job hunting.

Foreign Web attacks change security paradigm Traditional security systems may be ineffective and become obsolete in warding off Web attacks launched by countries, according to Val Smith, founder of Attack Research. New attack trends include blog spam and SQL injections from Russia and China, Smith said during his talk at the Source Boston Security Showcase on Friday.

Dangerous Windows Error Message Errors Weadock: Yes, you read that correctly. I’m writing today about Windows error messages that are … erroneous. Actually I’m hoping that you will chime in with your own examples, but to start things off, here’s one I have run into several times in recent weeks.

Consultant who exposed flaw on Coleman site fires back A Minneapolis-based IT consultant is defending her decision to post details of a security weakness she found on former Minnesota Sen. Norm Coleman's campaign Web site in January, a flaw that later resulted in a donor database on the site being compromised.

Lawyer indicted in alleged pump-and-dump stock scheme A Texas securities lawyer and former employee of the U.S. Securities and Exchange Commission has been indicted on charges related to a stock pump-and-dump scheme that used spam e-mail to pump up the stock prices of several companies.

Business process flaws seen posing security risks Running a secure Web site means more than just guarding against cross-site scripting and SQL injection attacks. Flaws in the business processes that underlie Web sites can also present serious security risks, the CTO of a Web security company said Thursday.

Microsoft-led privacy group backs off legislation A Microsoft-led group set up three years ago has backed away from its original goal of pushing for comprehensive U.S. privacy legislation.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Oracle
rule

Live Webcast: Database Security.
Security and regulatory compliance are not optional despite slashed IT budgets. Join this Live Webcast sponsored by Oracle on Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Register for this Live Webcast now.

rule

Optimizing Systems Management.
IT professionals will realize lower costs and simplified management with a systems management appliance. Appliance-based systems should include: Comprehensive inventory support, secure application distribution, application usage monitoring and robust reporting. Find out if an appliance-based system is right for your organization today.
Download this whitepaper today.


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.

 

03/16/09

Today's most-read stories:

  1. 10 iPhone apps that could get you into trouble
  2. Cisco quietly downsizing through outsourcing
  3. Apple to unveil iPhone 3.0 OS update next week
  4. 15 free downloads to pep up your old PC
  5. FBI probe of Kundra's former D.C. technology officer may widen
  6. Rumors: Apple layoffs, 10-inch iPod Touch
  7. H-1B hiring too much of a hassle?
  8. Yusuf Acar busted by FBI as perp in federal bribery sting
  9. Microsoft, Intel to back Cisco's "Unified Computing" launch
  10. Conflicker.C variant set for April 1st surprise, CA says
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: