Search This Blog

Thursday, April 15, 2010

Gmail spam uses fake addresses to spread malware

Apache project server hacked, passwords compromised | Patch Tuesday: Microsoft safeguards video, Adobe secures PDFs

Network World Security

Forward this to a Friend >>>


Gmail spam uses fake addresses to spread malware
Gmail spam is on the rise. Spammers are using fake Gmail accounts to clog up in-boxes, making 'Gmail.com' the most abused domain name, according to Commtouch's quarterly Internet Threats Trend Report. Read More


WHITE PAPER: Cisco Systems Inc.

Peace Corp: Creating a worldwide unified network
Learn how the Peace Corp made its unified network a reality after selecting and deploying cost-effective WAN optimization gear. One of the key factors was selecting a platform that integrated with its existing network spanning 70 countries. The result is dramatically improved performance and significant cost savings. Learn More

WHITE PAPER: NetApp

Top 5 Hyper-V Best Practices
Read this whitepaper to get advice on everything from making sure you configure enough network connections, especially in iSCSI, to specifying the specific initiator groups and the correct LUN type when provisioning the NetApp LUN for use with Hyper-V. Learn More!

Apache project server hacked, passwords compromised
Hackers broke into a server used by the Apache Software Foundation to keep track of software bugs. Read More

Patch Tuesday: Microsoft safeguards video, Adobe secures PDFs
Microsoft unloads 11 updates for 25 vulnerabilities on Patch Tuesday while Adobe also gets IT managers' attention with its security advisory for Adobe Reader and Acrobat. Read More

Microsoft blocks 'movies-to-malware' attacks
Microsoft today patched 25 vulnerabilities in Windows, Exchange and Office, including nine marked "critical," the company's highest threat ranking. Read More


WHITE PAPER: Aerohive

Understand the Network Impact of 802.11n
As performance and reliability increase with 802.11n, the WLAN becomes a viable alternative to the wired network for mission- critical applications. This paper outlines the drawbacks of centralized controller-based approaches and how they will provide unavoidable roadblocks when faced with the increases in bandwidth provided by 802.11n. Read More!

NASA to rocket humanoid robot to International Space Station
Perhaps taking a page from a Star Wars script, NASA said today it will send its newest humanoid robot known as Robonaut2 - or R2 -- capable of using the same tools as humans letting them work closely with people into space onboard the Read More

Man who left USB drive in shared PC waived privacy claims, court rules
A person who forgot to remove a thumb drive from a shared computer that he was using waived his privacy claims to the content on that device, a federal judge in Florida has ruled. Read More

Researcher shows new clickjacking methods
A computer security researcher has released a new browser-based tool that can be used to experiment with next-generation "clickjacking" attacks along with details of the four new techniques. Read More


WHITE PAPER: Citrix Systems

Minimize Datacenter Costs with Server Offload
This technical guide helps you learn how to reduce your server costs up to 60%. You'll gain valuable information on how Citrix NetScaler helps reduce datacetner costs with server and infrastructure offload. Read More!

Anti-virus/anti-malware cheat sheet
Keeping up with the latest in anti-virus and anti-malware news can be a challenge for even the most diligent IT professional. This Network World "Anti-virus/anti-malware cheat sheet" is designed to give you a leg up on the latest news, trends, analysis and opinion in this most critical of IT subject areas. Read More

WikiLeaks and Iceland battle for Internet freedom
On March 15, 2010, the mysterious organization called WikiLeaks posted a 2008 analysis of itself from the US Army Counterintelligence Center. Readers will note that according to the preamble of the document, "Unauthorized Disclosure Subject to Criminal Sanctions." Read More

Microsoft acts to avoid Windows blue screen repeat
Microsoft took steps Tuesday to avoid repeating the debacle two months ago that left Windows XP users staring at the notorious "Blue Screen of Death" after they applied a patch. Read More

Facebook Overhauls Safety Center
In the wake of high profile cyber-bullying cases -- such as the one that led to a teenage suicide in 2006 -- social networking sites have been tightening the belt on Internet security. Pushing itself to the forefront, Facebook has overhauled its Safety Center with descriptive information for teens, parents, law enforcement officials, educators and general users to help protect themselves against scammers, bullies and other riffraff. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CompTIA A+ study kits (book, video, flash cards) are available from Cisco Subnet.Deadline April 30. 15 books on Microsoft Systems Center Enterprise suite are available, too.

SLIDESHOWS

10 useful Google Chrome Experiments
Google's Chrome Experiments is a Web site that showcases JavaScript programs which deliver a rich user-graphics experience. To date, there are about 80 projects featured on Chrome Experiments. Here are the 10 most useful.

Interop history quiz
The venerable networking tradeshow Interop convenes this month in Las Vegas. Answer the following 10 questions about Interop, keep score and see how you stack up at the end.

MOST-READ STORIES

  1. Cisco product delays opening doors for rivals
  2. Apache project server hacked, passwords compromised
  3. Would your spouse leave you if you did this to your residence?
  4. Fedora 13 beta released with many goodies for the enterprise
  5. Twitter to start pushing advertising to users
  6. Steve Jobs confirms no more support for original iPhone
  7. VMware, Salesforce.com to unveil cloud computing service
  8. Meet the MacBook Pro's Core i5 and i7 chips
  9. How to get the best cell phone service possible
  10. Man who left USB drive in shared PC waived privacy claims

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: