Friday, March 27, 2009

New ransomware holds Windows files hostage, demands $50; Safari hacker talks security

Cybercrooks have hit on a new twist to their aggressive marketing of fake security software
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Code Green Networks
rule

Avoid data loss during layoffs
Four out of five employees take confidential company data with them after they're laid-off. Attend this Webcast and learn strategies to protect your network from dismissed employees; how data is being stolen; technologies that protect data; and much more. Register today.

rule

Spotlight Story
New ransomware holds Windows files hostage, demands $50

By Gregg Keizer
Cybercrooks have hit on a new twist to their aggressive marketing of fake security software, and are duping users into downloading a file utility that holds users' data for ransom, security researchers warned Wednesday. Read full story

Related News:

Safari hacker talks security We recently discussed the PWN2OWN competition at this year's CanSecWest security contest, but if you're looking to really dig deep into matters of security, you'll want to check out this interview over at Tom's Hardware with contest winner Charlie Miller.

Firefox fix due next week after attack is published Online attack code has been released targeting a critical, unpatched flaw in the Firefox browser.

Bucking a trend, security appliance market grows The security appliance market in Western Europe grew 14.4% in 2008 and is expected to continue to expend this year, albeit at a slower rate, according to the latest figures from analyst firm IDC.

Committee questions lack of support for cybersecurity office The Senate Homeland Security Committee's senior-most Republican is asking DHS Secretary Janet Napolitano to explain why the National Cyber Security Center (NCSC), set up within the department last year, has seemingly been marginalized by the agency.

Survey gauges Web application security spending A new survey shows that despite the dismal economic conditions, more than a quarter of the companies polled expect to spend more on Web application security this year.

U.K. police to track e-crime, fraud down to the last pence The fight against e-crime in many countries has been the equivalent of pushing the tide with a broom.

OFLC Web site hacked The Office of Film and Literature Classification Web site has been defaced by what appears to be a group opposed to the government censorship.

Cisco issues patches for IOS bugs Cisco releases eight updates that target 11 security vulnerablities -- most of which could disable or disrupt service on a router.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Code Green Networks
rule

Avoid data loss during layoffs
Four out of five employees take confidential company data with them after they're laid-off. Attend this Webcast and learn strategies to protect your network from dismissed employees; how data is being stolen; technologies that protect data; and much more. Register today.

rule

Case Study: Successful LAN Support
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/27/09

Today's most-read stories:

  1. IBM confirms North America layoffs
  2. IPv6 is not backwards compatible, developers admit
  3. Nasty new worm targets home routers, cable modems
  4. CEO payday: How much tech chiefs made in '08
  5. Google: IPv6 is easy, not expensive
  6. Melissa virus turning 10 ... (age of the stripper unknown)
  7. The FCC teaches me a lesson: Don't complain
  8. 10 great free sites and downloads
  9. Rogue SharePoint sites pose security menace
  10. Hackers turn Google into vulnerability scanner
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment