| As image spam declines, PDF spam ready to take its place Security vendors and users agree that image spam is finally on the decline, but at the same time a new kind of spam is emerging that uses an attached PDF file to trick recipients into buying stock in a company. For spammers, a picture is better than 1,000 words Spam is again on the rise, led by a flood of junk images that spammers have crafted over the past few months to trick e-mail filters, according to security vendors. The state of spam: An interview with Jamie de Guerre, Part 1 Spam is a major operational problem for all professionals because of its waste of bandwidth; it is a significant nuisance even for non-professionals, contributing to computer-based crime and increasing doubts about e-commerce. I recently interviewed Cloudmark CTO Jamie de Guerre via e-mail and am pleased to convey our discussion in a two-part report. The state of spam: An interview with Jamie de Guerre, Part 2 What does the future hold for fighting spam? My two-part interview with Jamie de Guerre, CTO of Cloudmark, concludes today. MSN blunder causes user confusion, smells phishy It may have look like a phishing attack, but an alert sent out to Windows Live Messenger (MSN) users to change their details was triggered by an internal blunder in the US. Spam recovers from a knockout blow The Internet is now officially as bad as ever, at least as far as spam goes. US convicts first foreigner of phishing A 23-year-old Romanian man has become the first foreigner to be convicted by a U.S. court for phishing. IE8 best at blocking malware sites, says study A recently released report claims that Internet Explorer 8 (IE8) is more than twice as effective at blocking malware sites than its nearest rival. Spam filters block legitimate e-mail, finds test Many antispam products still block an inconvenient amount of legitimate email, a new test of leading products has suggested. Cyberspies have compromised U.S. power grid, newspaper reports Cyberspies, probably from Russia or China, have penetrated the U.S. electrical grid and left behind software programs that can disrupt it, says an article in the Wall Street Journal that neither names the source of the information nor where this compromise of the grid is occurring. Chinese information warfare capabilities As world economic conditions continue to worsen, I expect to see growing use of industrial espionage techniques by current actors and by new ones. Threats against proprietary information and perhaps even risks from sabotage may well increase over the next months and perhaps years. Despite the reflex tendency for retrenchment as revenues fall, now is not the time to be reducing the information security workforce. April giveaways galore Cisco Subnet and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30. Network World on Twitter Get our tweets and stay plugged in to networking news. |
No comments:
Post a Comment