Wednesday, January 28, 2009

New botnet resurrects Storm's Valentine's Day ruse;17 High-Risk Security Threats and How to Fix Them

Spam trumpeting the power of love is nothing more than an old trick dressed up in new clothes
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Splunk
rule

5 Ways to see Network trouble coming
Find and fix problems before they impact your network. Learn how in this Webcast, "Become a Network Psychic: 5 ways to see trouble coming and stop it before it starts." John Gallant CEO of Network World will introduce and Erik Swan, CTO, of Splunk will review timely information regarding troubleshooting and proactively monitoring the network. Review this program today.

rule

Spotlight Story
New botnet resurrects Storm's Valentine's Day ruse

By Gregg Keizer
Spam trumpeting the power of love is nothing more than an old trick dressed up in new clothes, more evidence that the backers of the Waledec bot Trojan are the same bunch that hammered users last year with Storm, security companies are warning. Read full story

Related News:

17 High-Risk Security Threats (And How to Fix Them) Network worms. Phishing e-mail. Drive-by downloads. Data sniffed from an open wireless network. To use a computer safely in the 21st century, you have to be prepared to combat a growing number of constantly evolving security threats.
Plus:
17 High-Risk Security Threats (And How to Fix Them)
How to Stop Operating-System Attacks
How to Lock Down the Data in Your Apps
How to Safeguard Your Online Security
How to Beat Card Skimmer Scams, Other Money Drains
How to Plug Security Holes in Your Browser
How to Keep Your Cell Phone Info Private
How to Protect Your Online Passwords

ICANN ponders ways to stop scammy Web sites The overseer of the Internet's addressing system is soliciting ideas for how to fix a problem that is enabling spammers and fraudulent Web sites to flourish.

IE8 Focuses on Improved Security and Privacy Microsoft's updated browser, Internet Explorer 8, promises an assortment of new features designed to help make Web browsing with IE safer, easier, and more compatible with Internet standards. We looked at the first release candidate of the new browser released to the public today, Release Candidate 1 (RC1). On the surface, IE 8 seems to be a lot like IE 7, but Microsoft has made a number of changes under the hood. You may have seen some of these new features already, however, in IE's no-longer-upstart competitor, Mozilla Firefox 3.

Monster.com Breach: Evolution of a Disclosure Letter When Monster.com suffered a data breach last year, two disclosure letters went out to customers -- one from Monster itself and another from US AJOBS, a federal employment organization that relied on Monster.com databases for its job listings. Though they covered the same breach, each letter was starkly different.

Safety Precautions for Monster.com Users after Hack Attack Monster.com announced on Friday that its database was illegally accessed, and that crooks lifted user data including "Monster user IDs and passwords, e-mail addresses, names, phone numbers, and some basic demographic data." The attack extended to the USAJobs federal site (usajobs.opm.gov), as Monster.com is a technology provider for that site.

Security Firm Sees Alarming Rise in 'Transient' Threats Antivirus firm AVG Technologies says an alarming rise in the number of virus-laden sites that are here today and gone tomorrow is causing security experts to re-think traditional virus protection strategies.

Cisco delivers security, storage and unified communications for small business Cisco this week unveiled products specifically for small companies as part of its recently announced $100 million commitment to that business market.

Stop Internet Poachers from Stealing Your Wi-Fi Everyone has a different system for keeping their home networks secure. And by "secure" I mean "safe from cheapskate neighbors looking to poach some free Internet."

What's the Conficker worm got to do with NAC? The Conficker worm doesn't directly have anything to do with NAC, but as is the case when any pervasive attack becomes high profile, vendors leap in to point out how their products could have prevented the problem.

End regional lockout of products and services Microsoft Subnet blogger Tyson Kopcynski tells the story of how Amazon hasn't figured out it’s a big, global world.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Splunk
rule

5 Ways to see Network trouble coming
Find and fix problems before they impact your network. Learn how in this Webcast, "Become a Network Psychic: 5 ways to see trouble coming and stop it before it starts." John Gallant CEO of Network World will introduce and Erik Swan, CTO, of Splunk will review timely information regarding troubleshooting and proactively monitoring the network. Review this program today.

rule

HP Logical Servers
Make your datacenter infrastructure more adaptive with logical server technology. Find out how you can simplify routine tasks and create more efficiency within your datacenter.
Learn more


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/28/09

Today's most-read stories:

  1. What's the Conflicker worm got to do with NAC?
  2. HP readies for Cisco's data center assault
  3. White House e-mail crashes
  4. New Data Center: storage
  5. Downadup/Conflicker worm: When will the next shoe fall?
  6. Mobile feds: We want our BlackBerries too
  7. Windows 7: the untold story of how the enterprise gets snubbed
  8. IBM confirms layoffs
  9. iPhone to get global flat-fee voice service
  10. FAQ: How to protect your PC against the Downadup worm


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment