Search This Blog

Monday, March 15, 2010

FBI details most difficult Internet scams

Seven Firefox Plug-ins That Improve Online Privacy | FBI: Internet fraud losses more than doubled in 2009

Network World Security Alert

Forward this to a Friend >>>


FBI details most difficult Internet scams
According to the FBI and the IC3 Web site, the "popular scam trends for 2009" included hitman scams, astrological reading frauds, economic scams, job site scams, and fake pop-up ads for antivirus software. Read More


RESOURCE COMPLIMENTS OF: Cisco

Cisco AnyConnect Secure Mobility
Cisco AnyConnect Secure Mobility solution provides next-generation remote access with consistent policy enforcement for today's mobile workforce. Learn more now.

WEBCAST: Actuate

Discover BIRT.
Understand how BIRT simplifies and speeds to market the development of rich information applications. In this presentation, a technical expert behind BIRT will demonstrate a customer-facing application in action with Flash, Ajax, and JavaScript interactivity. Click Here!

Seven Firefox Plug-ins That Improve Online Privacy
Worried about preserving your privacy in an online world where privacy is disappearing? Here are seven Firefox add-ons that will help. Read More

FBI: Internet fraud losses more than doubled in 2009
The Federal Bureau of Investigation's annual wide-ranging look at Internet crime found that online crime is indeed paying off - for the criminals as it cost users $559.7 million, up from $265 million in 2008. Read More

Cyber ShockWave Illustrates Why the Federal Government Must Lead the Cybersecurity Charge
Last week I wrote a blog suggesting that IT professionals and legislators read the new book, "Fatal System Error," by Joseph Menn. This recommendation was based on my believe that most people don't understand the scope of sophistication of current cyber threats and we need more government and private sector action and cooperation immediately. Read More


WEBCAST: ShoreTel

A Lower Cost Approach to UC
Learn about a switch-based architecture that provides the industry's lowest total cost of ownership while exploiting the full power of IP. See why this system beats the market leaders and has over 1 million users like Big Brothers/Big Sisters who candidly discuss their selection process, goals and ultimate success in moving to UC. Learn More!

Cloud Security is Top of Mind
At the annual security RSA Conference, the focus was all things cloud. Forget for a moment that definitions of "cloud" are still in flux, or that aside from SaaS, the adoption rate is still in the margin-of-error range (just 2% of benchmark participants told Nemertes in 2009 they were currently deploying cloud services). Indicators point to strong enterprise interest---and this time, the security industry... Read More

Security execs express surprise over CISO's firing following RSA talk
Several security executives today expressed surprise over the firing of Pennsylvanias chief information security officer, apparently for publicly speaking about a security incident involving the Commonwealth's online driving exam scheduling system without getting the required approvals first. Read More

Apple plugs 16 holes in Safari as Pwn2Own looms
Apple has patched 16 bugs in the Safari browser, 12 of them critical, just two weeks before it faces off against rival technologies at the 2010 Pwn2Own hacking challenge. Read More


WHITE PAPER: Microsoft

Direct Access and UAG Better Together
Direct Access (DA) is a game-changing technology for remote access in your company; removing the need for a VPN all together. Within Microsoft, we've seen great productivity benefits to end users. We surveyed users from our DA pilot and over 87% saw instant productivity gains, overall resulting in net benefit of ~1 hour each day for users. Furthermore, Microsoft operations is saving costs by things such as not having to convert internet connected sites to dedicated lines. For more information on the business value of DA and Microsoft's implementation, watch the Direct Access MSIT video. Learn More Now

Former Barclays programmer gets four years for role in TJX attacks
A former Barclays Bank programmer who helped launder money for the mastermind behind the data thefts at TJX Companies Inc. and other retailers, was sentenced to four years in prison by a federal court in Boston. Read More

Online banking fraud surges by 14 percent
Online banking fraud surged by 14 percent in 2009, says the UK Cards Association. Read More

FDIC: Hackers stole $120M+ last quarter; Microsoft seeks browser comback with IE9
Ongoing computer scams targeting small businesses cost U.S. companies $25 million in the third quarter of 2009, according to the U.S. Federal Deposit Insurance Corporation. Also, Microsoft is expected to share details about Internet Explorer 9 at its upcoming MIX10 conference, and industry watchers say the forthcoming release could help the software giant put part of its embattled browser past behind it. (4:53) Read More

Chrome OS Netbook security; State of 4G
Google's Chrome OS Netbook will feature a host of built-in security technologies designed to protect users from malware and other threats, a Google engineer said at the RSA Conference Thursday. Also, by the end of 2010, Clearwire plans to have built out its 4G WiMAX network to all major markets in the United States, and Verizon expects to be offering its 4G LTE services commercially in 25 to 30 major U.S. markets. (6:03) Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

The Future of Big Iron
Do your IT plans include mainframes? Participate in this Aberdeen survey and see how your plans stack up to those of peers in terms of on what core applications are staying on mainframes and where the industry is headed in operating and software architecture. The goal is to get an accurate picture of the opportunity for expanded utilization, the role of 3rd-party support, and overall objectives with respect to distributed, outsourced, heterogeneous and centralized computing paradigms. Aberdeen will also establish a baseline for performance and a set of best practices for improving the efficiency and utilization of mainframe computing technologies. All survey respondents will receive a free copy of the resulting research.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. NEW! 15 books on Microsoft System Center Operations Manager (OpsMgr) 2007 R2 available, too.

SLIDESHOWS

21 apps Apple doesn't want on your 3.0 iPhone
The following 21 apps today run only on jailbroken iPhones. Some may even prove precursors to features released in future Apple iPhone firmware updates.

10 geeky items you're embarrassed to admit you want
Most of us love gadgets. But there is a certain eye-popping reaction when we find a gadget that speaks to our technological selves. Owning such devices would surely be the subject of teasing from those who deny their inner geek, but it would also be the cause of more than a little envy.

MOST-READ STORIES

  1. ZeuS botnet code keeps getting better
  2. 2010 tech industry graveyard
  3. Facebook pushing 'Suicide Machine' into an open-source afterlife
  4. Pennsylvania fires CISO over RSA talk
  5. FCC launches broadband test site for consumers
  6. Cisco, Microsoft certifications increase high-tech salaries
  7. Ex-Cisco engineer Randall out at Brocade
  8. Sorry to say good-bye
  9. 'Pearl Harbor' post struck a nerve
  10. Attorney sues Cisco, others for patent infringement on IPTV

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: