Search This Blog

Tuesday, March 17, 2009

Spam delivers fake news of bomb blast as lure to malicious code; Hacker Joe Grand offers IT advice

4 Steps to the Security Industry's Economic Survival; BBC in hot water for hiring botnet
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Live Webcast: Database Security.
Security and regulatory compliance are not optional despite slashed IT budgets. Join this Live Webcast sponsored by Oracle on Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Register for this Live Webcast now.

rule

Spotlight Story
Spam delivers fake news of bomb blast as lure to malicious code

Ellen Messmer By Ellen Messmer
Beware the fake bomb threat and destruction message posing as local news in a spam effort to get victims to click on a fake Reuters video and download malicious code to their computers, says security firms observing the spam deluge. Read full story

Related News:

Video: Hacker Joe Grand offers IT advice Joe Grand, a hardware hacker and host of Discovery's Prototype This! TV show, offers advice on how IT can share information with non-technical colleagues.

4 Steps to the Security Industry's Economic Survival Everyone is focused on clinging to a job or finding a new one in these dark economic times. In doing so, avoiding controversy and risk is usually standard operating procedure. But it shouldn't be, according to several security industry heavyweights who attended the recent SOURCE Boston conference.

BBC in hot water for hiring botnet The BBC has been come in for sharp criticism over the decision by its Click computing show to hire a live botnet to demonstrate the ease with which spam can bombard e-mail users.

Kraken the botnet: The ethics of counter-hacking The Kraken is a huge network of personal computers that have been infected with software that turns them into zombie systems under the control of a master program - a botnet. The Kraken botnet is used by criminals to generate spam.

Next Symantec CEO to focus on security In three weeks, Cupertino, Calif.-based Symantec's chief operating officer Enrique Salem will assume the role of "CEO designate", and drive the company's focus back to security following a period of strayed focus, he said.

Two start-ups, Egress and SafeMashups, make debut today Two start-ups, Egress Software Technologies and SafeMashups, each make their debut today with security products that have a crypto-tech edge to make data flowing across the Internet safer.

Securing Your Virtualized Environment Virtualization promises to make IT departments more flexible, more efficient and -- perhaps most crucial in these tough times -- more frugal. But one advantage the technology doesn't provide is an escape from the need for strong security measures.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by Oracle
rule

Live Webcast: Database Security.
Security and regulatory compliance are not optional despite slashed IT budgets. Join this Live Webcast sponsored by Oracle on Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT to better understand the economics of IT security. Learn about the importance of database security in a cost-efficient IT security strategy. Register for this Live Webcast now.

rule

The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.

 

03/17/09

Today's most-read stories:

  1. BMC's role in Unified Computing System launch
  2. 10 iPhone apps that could get you into trouble
  3. Cisco quietly downsizing through outsourcing
  4. Cisco unveils "unified computing system," blade server
  5. Cisco's data-center push holds promise, perils
  6. 15 free downloads to pep up your old PC
  7. Sharp turns like Cisco's have a long history
  8. Will the real mobile enterprise device please stand up?
  9. Sale of key Nortel assets may be inevitable
  10. Authentication with a twist
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: