Search This Blog

Wednesday, October 07, 2009

FBI says trio of terrorism e-mails are bunk

15 genius algorithms that aren't boring ; Microsoft confirms Hotmail lost thousands of passwords to phishing scheme
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Arbor Networks, Inc.
rule

Protecting Internet Data Centers
Your Internet data center plays a vital role in the success of your business. Learn how optimizing and protecting your IDC's network infrastructure, IP-based services and data before they fall victim to attacks or compromise ensures that your network and in-cloud services remain available and profitable.

Click to continue

rule

Spotlight Story
FBI says trio of terrorism e-mails are bunk

The FBI today warned that three separate e-mails making the rounds that promise access to FBI terrorism reports are nothing more than malicious software looking to steal your personal information. The three scam-mails are: Read full story

Related News:

15 genius algorithms that aren't boring
All computer systems are not created equal. Some get to run way cooler applications than others. Here we take a look at 15 unique algorithms designed to prevent denial-of-service attacks, jam electronic signals, monitor your behavior and yes, tell you how bad your gout is.

Microsoft confirms Hotmail lost thousands of passwords to phishing scheme
Microsoft is admitting that thousands of Windows Live Hotmail account usernames and passwords have indeed leaked to the Internet as reported by Neowin.net. But the company also said the attack was not caused by an internal security breach. It was the result of a massive phishing attack, reports Computerworld.

Nasty banking Trojan makes mules of victims
A sophisticated Trojan horse program designed to empty bank accounts has a new trick up its sleeve: It lies to investigators about where the money is going.

Bitbucket's downtime is a cautionary cloud tale
Bitbucket's weekend troubles with Amazon's cloud services are instructive, but don't necessarily indicate a problem with cloud security.

Shields Up! Time to Start Blocking with your Cisco IPS Sensors
Cisco started to include reputation functionality in its IPS sensors about 6 months ago with its 7.0 release. The data has been collected on how effective it has been so far. The findings are significant. Cisco's addition of reputation data to its IPS sensor software has resulted in a 100% increase in effectiveness over signature protection alone. Additionally, it has been found that a reputation...

Hackers plan to clobber the cloud, spy on Blackberries
A new era of computing is on the rise and viruses, spies and malware developers are tagging along for the ride.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 07, 2009

MOST-READ STORIES

  1. Pentagon: Our cloud is better than Google's
  2. For sale: Cisco data center rival Brocade
  3. Apple may take Woolworths to court over similar logo
  4. 10 seriously ridiculous hacks
  5. Cisco releases IOS 15.0
  6. Review: HP blade takes a stab at Cisco
  7. 15 genius algorithms that aren't boring
  8. 500 words too taxing? Does the 'T' in MIT stand for Tweet?
  9. Sprint likes multiple mobile operating systems
  10. Nortel could offload Metro Ethernet unit to Ciena

VMware Data Backup and Recovery Best Practices
VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources and administrative challenges. Data Domain deduplication storage offers a way out by reducing redundant data across VMware data backups, operating at disk speeds, and providing cost-effective replication for fast DR using backup images.
Click here to learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: