I N T H I S I S S U E
Welcome to the PCMag.com Security Watch Newsletter. Every week we bring you an overview of the current viruses, worms and other threats and the information you need to combat them.
The security in the wireless Bluetooth protocol has been smashed with a practical attack that can be applied to all Bluetooth-enabled devices. Get details in the Top Threat section.
How many companies have been abused by phishing attacks? Find out on the Phishing Trends page.
Phishers have found a new simple trick to instill false confidence in their victims. Get the facts in this week's Top Phish section.
How to define spyware has always been a controversial topic. Now an industry group has formed to formalize the definition of spyware. Read more in the Security Watch Story Feed.
For more on these threats, vulnerabilities and other issues, visit the Watch. Top Threat: Bluetooth Hijacking Highlights of the April Phishing Trends Report of the Anti-Phishing Working Group Top Phish of the Week Security Watch News Feed ADVERTISEMENT | Top Threat: Bluetooth Hijacking Israeli researchers have discovered an enhancement on an earlier Bluetooth vulnerability, the result of which is to put all Bluetooth-enabled devices at risk of compromise. The flaw is in the core protocols of Bluetooth, and, as such, is not limited to specific implementations.
See our Top Threat section for more on Bluetooth hijacking.
Highlights of the April Phishing Trends Report of the Anti-Phishing Working Group * Number of active phishing sites reported in April: 2854 * Average monthly growth rate in phishing sites July 2004 through April 2005: 15%
For the full list, visit the Phishing Trends page.
Top Phish of the Week Name: Just Call Me Date: June, 2005 Type: Phishing - Financial Information
For more on this phishing attack, see our Top Phish section.
Security Watch News Feed June 6, 2005: Cisco Launches DDoS Protection Service June 3, 2005: Next Anti-Spyware Group Pushes for Standards Get more links in the Feed.
Questions, comments, tips about potential viruses, worms, vulnerabilities? Send them here.
The PCMag.com Bookstore PC Magazine Windows XP Speed Solutions Does everything seem to be moving very, very slowly? Then it's time to call in PC Magazine's favorite system doctor. This indispensable book show you exactly how to turn that snail into a cheetah by unloading the junk that Windows XP had collected, turbocharing your system for faster response, cleaning up the Registry, and using all the safeguards provided in Service Pack 2.
PC Magazine Windows XP Solutions Ever wish they'd consulted you before they designed Windows XP? Sure, it's a great system, but there's this one feature that makes you crazy. Or that annoying problem that keeps occurring. Well, you can rely on Neil Randall and your friends at PC Magazine to correct that oversight. Here's the complete compendium of solutions to the things that bug you, threaten your security, slow you down, or other-wise prevent Windows XP from achieving perfection.
More Books
Product Solutions from Ziff Davis Web Buyer's Guide Sponsored Listings | Security Product: RazorGate 100 Mirapoint's RazorGate email security appliances offer industrial-strength multi-layered protection that stops spam, fraud, phishing attacks, viruses, and other security threats. Get free product information | | Security Product: Websense Web Security Suite This integrated web security solution offers spyware protection, blocks malicious mobile code and provides real-time internet security updates for immediate protection from new security threats. Get free product information | |
eNewsletter Information You are subscribed to PCMag.com's Security Watch with the email address security.world@gmail.com. Click here to unsubscribe from this newsletter.
To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here.
Copyright © 2005 Ziff Davis Media, Inc. All Rights Reserved. Ziff Davis Media Inc., 28 East 28th Street, New York, NY 10016
| | |
No comments:
Post a Comment