Search This Blog

Thursday, January 08, 2009

Google No. 4 on top 10 list of spam enablers; Fake LinkedIn profiles send malware

Recession Be Damned! IT Security Spending Up For Some
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Message Labs
rule

Successfully Protecting your Email.
Find out how managed email security services offer the most cost-effective email protection available. Managed offerings bundle many security features including anti-spam, anti-virus and policy-based encryption. It's easier to deploy and it costs less. Get all of the details today. Download this whitepaper now.

rule

Spotlight Story
Google comes in fourth on top 10 list of spam enablers

By Jeremy Kirk
Google has yet to stop a rising number of spammers from abusing Google Docs, its Web-based collaboration and spreadsheet application, according to junk mail watchdog Spamhaus. Read full story

Related News:

Fake LinkedIn profiles promise pics, send malware instead Hackers have seeded LinkedIn , the business networking service, with bogus celebrity profiles that link to malicious sites serving up attack code, a security researcher said Wednesday.

CheckFree warns 5 million customers after hack CheckFree and some of the banks that use its electronic bill payment service are notifying more than 5 million customers after criminals took control of several of the company's Internet domains and redirected customer traffic to a malicious Web site hosted in the Ukraine.

Malwarebytes finds pesky Trojan The last Gearhead column wherein Gibbs discovered that his Windows XP machine was acting weirdly generated a huge amount of reader feedback and one recommendation -- using Malwarebytes Anti-Malware -- worked where many others hadn't.

Kerio unveils Mac client for its VPN Messaging and security vendor Kerio in March will release a Mac-based VPN client for its WinRoute Firewall.

Recession Be Damned! IT Security Spending Up For Some The economy may be in tatters, along with legions of IT security budgets. But a new report from Forrester Research suggests security spending is actually on the rise in some enterprises.

Data breaches rose sharply in 2008, says study More than 35 million data records were breached in 2008 in the U.S., a figure that underscores continuing difficulties in securing information, according to the Identity Theft Resource Center (ITRC).

FBI/DOJ warns of economic cybergeddon A couple of speeches this week by FBI and Department of Justice executives are warning that if law enforcement and others connected with keeping the Internet a secure and safe place to do business and socialize the world could be headed toward a cyber-based economic meltdown - cybergeddon.

Trend Micro, BigFix integrate antimalware and systems management wares Vendors partner to combine Trend Micro's antimalware and Web protection technologies with BigFix's patch management and security configuration functionality.

Securing Virtual Machines Starts With Sound Policies The ease and speed of deploying a virtualized environment has allowed some IT professionals to overlook security concerns that may be brewing up in the cloud. 

Hong Kong businessman guilty of spam to influence stocks A Hong Kong businessman has recently pleaded guilty for his part in dispatching tens of millions of spam messages to pump up the prices of Chinese stocks between 2004 and 2006.

Best practices for removable media encryption USB flash drives, iPods and other portable storage devices are pervasive in the workplace and a real threat. They can introduce viruses or malicious code to the network and be used to store sensitive corporate information. While IT has responded with policies and audits, the best way to safeguard data taken outside of a managed envrionment is encryption.

Cisco changes its docs to reflect that it does support 3rd party VPNs Recently, some network engineers slammed Cisco for what appeared to be a statement that it would no longer support third-party IPsec VPNs. Cisco has since republished all its documentation to state that it does support non-Cisco VPNs.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Message Labs
rule

Successfully Protecting your Email.
Find out how managed email security services offer the most cost-effective email protection available. Managed offerings bundle many security features including anti-spam, anti-virus and policy-based encryption. It's easier to deploy and it costs less. Get all of the details today. Download this whitepaper now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits. Find out how to make it happen today.
Download this Executive Guide now.

 

01/08/09

Today's most-read stories:

  1. IBM employees buzzing about layoff rumors
  2. AT&T builds $23M IPv6 network for U.S. military
  3. Outlook '09
  4. Is VoIP dead?
  5. Microsoft layoff rumors continue their swirl
  6. Rogue SSL certificate exploit puts VeriSign on the spot
  7. Best iPhone apps: Office and personal productivity
  8. Salary calculator
  9. Nearly 1 million jobs could be created by IT stimulus package
  10. Three ways a Twitter hack can hurt you


Network Security you Need
Zero in on the hottest security technologies you need to know about in this Executive Guide, "The Evolution of Network Security." Stay out in front with the most up-to-date information on network security. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: