Search This Blog

Tuesday, April 14, 2009

The state of spam 2009, Part 2

McColo and ICANN
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by NCP Engineering
rule

IPSec easier than SSL! Next Generation Network Access Technology
NCP combines the benefits from both VPN technologies in a holistic solution. The headaches associated with secure remote network access are now a thing of the past: less trouble, less complexity, less investment. Live at RSA Conference on booth 1356-1.

rule

Spotlight Story
The state of spam 2009, Part 2

M. E. Kabay By M. E. Kabay
Cloudmark CTO Jamie de Guerre: I think there have been several changes and a couple of events that happened in the past year that are interesting and will have an effect on how spam is sent in the coming year. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

The state of spam 2009, Part 1 Spam - not SPAM the luncheon meat (and you have GOT to visit the official SPAM Web site, which plays like a parody the Monty Python crew might have dreamed up) - is a dreadful nuisance, with estimates that 95% of all e-mail in the world now consists of rubbish. Periodically I look into the state of the spam to see how the war is going.

Botlab keeping an eye on spamming botnets University of Washington researchers have developed a prototype system called Botlab that monitors botnets to gain insight into a major generator of spam.

ISP cut off from Internet after security concerns A U.S. Internet service provider suspected of aiding cybercriminals in online scams and hosting child pornography was at least partially cut off from the Internet on Tuesday night.

After McColo takedown, spam surges again Spammers have regrouped and are finding ways to send more junk mail despite recent efforts by security experts.

Security networks send spammers underground Botnets will employ more obfuscated control techniques including the use of peer-to-peer networks during 2009, according to security researchers, following the McColo data center take-down last year.

McColo takedown: Vigilantism or Neighborhood Watch? Few tears were shed when McColo, a San Jose-based ISP that allegedly hosted companies known to be prolific purveyors of spam and other malware, was suddenly taken offline last Tuesday by its upstream service ...

ICANN ponders ways to stop scammy Web sites The overseer of the Internet's addressing system is soliciting ideas for how to fix a problem that is enabling spammers and fraudulent Web sites to flourish.

Security Tops IT Budget Priorities Security is on the minds of American companies and many are still making room in their budgets to invest in IT security initiatives, according to a survey released Monday by Robert Half Technology.

Trend Micro dishes out security smorgasbord Trend Micro Monday dished out a smorgasbord of endpoint security products that put the focus on Trend's cloud-based architecture and its partnership with systems-management vendor BigFix.

User education key to IT security: Microsoft With the release of its latest Security Intelligence Report, Microsoft is encouraging its partners and customers to become more security aware and educated, as new attack tactics are on the rise.

Prevent intrusions: What to look for In the Buying Tips section of our Product Guide, find 15 questions to ask about IPS before you buy one.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by NCP Engineering
rule

IPSec easier than SSL! Next Generation Network Access Technology
NCP combines the benefits from both VPN technologies in a holistic solution. The headaches associated with secure remote network access are now a thing of the past: less trouble, less complexity, less investment. Live at RSA Conference on booth 1356-1.

rule

Responsible for building a resilient data center

Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free: Visit http://www.nww.com/rpgx.jsp?c=XU1PHA3113Z4303.

Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.

 

04/14/09

Today's most-read stories:

  1. Conficker awakens, starts scamming
  2. Microsoft eating up U.S. and global netbook markets
  3. Bill would give Obama power to shut down Internet
  4. Are you an IT geezer? (and we mean that in a good way)
  5. A Twitter virus shows up: StalkDaily
  6. The 10 worst Microsoft product names of all time
  7. Netbook computers spark corporate interest
  8. Conficker, the Internet's No.1 threat, gets an update
  9. The implications of Skype's free software application for iPhone
  10. Fear and loathing in Windows 7: Testing Branch Cache using Linux
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: