Friday, January 04, 2008

Facebook widget tricks users; 'Ransomware' extorts payment by phone; Solve data leak threat

Security Alert

Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Facebook's "Secret Crush" malicious widget tricks users

Ellen Messmer By Ellen Messmer
Facebook "Secret Crush" malicious widget tricks users into downloading adware, according to Fortinet. Read full story

Senior Editor Ellen Messmer covers security for Network World. Contact her at emessmer@nww.com.

MORE STORIESARROW


SPONSORED BY ORACLE
rule

Enterprise Linux: How Oracle Support Differentiates Itself
Read IDC's report on how Oracle support differentiates itself in a commodity market. To learn more download this free whitepaper today!

rule
RELATED NEWS:

'Ransomware' extorts payment with phone call, 01/03/2008 New "ransomware" that locks up a person's PC and demands $35 to return control to its user is on the prowl, a security researcher said this week. ...

Protecting against data leaks, 12/20/07 Three project types are getting the go-ahead on a variety of projects aimed at solving the ever-present data leakage threat. They involve privacy, enterprise rights management and even data center automation initiatives.

UK. politicians want losing data to be a crime, 01/03/08 A committee of MPs has called for tougher criminal penalties for data security breaches as incidents where the government or contractors have lost people's personal data continue to come to light.

Malware honeypots wait for '08, 01/02/08 An innovative malware honeypot project backed by a leading consortium of IT security experts is preparing to re-launch its global sensor network after Jan. 1 in an effort to dupe more cybercriminals into handing over information about their latest attack methods.

8 hottest skills for '08, 01/03/08 No one is mistaking the current IT jobs market for the one that sizzled during the dot-com days and inflated salaries to astronomical rates. But as the U.S. economy wrestles with a weak housing market and record oil prices, demand for IT workers is on the rise.

8 hot-button issues to watch in '08, 01/03/08 Ready for 2008? Budgets may tighten up, but IT's challenges will just keep growing: security problems, virtualization technology, legal issues, users who can't be stopped and that worrisome baby-boomer brain drain. Here are eight hot-button issues to watch out for in the coming year.

US-CERT warns of flaw in latest RealPlayer, 01/02/08 The US-CERT is warning computer users of a possible problem with the latest version of RealPlayer after a Russian security company claimed to ...


EVERYTHING THAT MATTERS
Everything that Matters in IT Exploring what matters most in IT today.

TAMING THE VIRTUAL BEAST
Clear Choice Test VM management tools from Microsoft, VMware, XenSource leave room for improvement.

SPONSORED BY ORACLE
rule

Enterprise Linux: How Oracle Support Differentiates Itself
Read IDC's report on how Oracle support differentiates itself in a commodity market. To learn more download this free whitepaper today!

rule

Complimentary Subscriptions for IT Professionals
Sign up today and receive a yearly subscription to Network World magazine. Each week Network World is jam-packed with news, analysis, expert industry opinions and management advice that many network IT professional can't live without. Why not join them? Click here to subscribe: http://www.nww.com/PSA2_0102

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnssfuff.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

01/04/08

TODAY'S MOST-READ STORIES:

  1. Eight can't-miss tech predictions for 1998
  2. Google quietly gains control of open source
  3. The 15 best downloads of the year
  4. 'Diehard' virus variants flexing muscle
  5. Everything that matters in IT
  6. 12 IT skills that employers can't say no to
  7. BoA authenticates via mobile phone
  8. Cisco's virtual switch smashes records
  9. Security dominates 2008 IT agenda
  10. Eight hottest skills for '08

MOST DOWNLOADED PODCAST:
LinuxWorld interview with Jeremy Allison


Webcast: Beyond perimeter security

Listen to industry experts discuss the need for strong security throughout an IT environment. One expert says, the barbarians are not at the gate, they are already inside. Securing one access point to your network simply is not enough. Learn more today.

Access this webcast now.



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment