Monday, April 20, 2009

New Twitter worm targets celebrities; First Mac OS X botnet activated

Researcher offers tool to hide malware in .Net; Twitter teen hacker hired by Web app developer
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Why virtualization? Why now?
In this video, we tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help you address these demands.

rule

Spotlight Story
New Twitter worm targets celebrities

Agam Shah By Agam Shah
A worm referencing celebrities such as Ashton Kutcher and Oprah Winfrey is rapidly spreading across microblogging site Twitter, security firm Sophos said on Friday. Read full story

Related News:

First Mac OS X botnet activated The first botnet created with Mac computers running OS X software has been activated, according to reports filtering out across the Internet.

Researcher offers tool to hide malware in .Net A computer security researcher has released an upgraded tool that can simplify the placement of difficult-to-detect malicious software in Microsoft's .Net framework on Windows computers.

Twitter teen hacker hired by Web app developer An Oregon-based Web application developer Friday confirmed he has hired the teenager who admitted attacking Twitter with several different worms last weekend.

Google offers top tip to help beat bots Google has put a new spin on the CAPTCHA, a way of helping Web sites distinguish between human visitors and bots: It wants people to tell it which way is up in a series of randomly rotated images, a task that humans find easy and computers difficult.

Microsoft: The Internet needs more trust to grow The Internet needs to be more trustworthy if it wants to grow, according to Microsoft's senior security executive, Scott Charney.

Cellcrypt secure VoIP heading to BlackBerry Cellcrypt, a British vendor of software for encrypting cell phone calls, has set up shop in Silicon Valley and is getting a product ready for North America's beloved BlackBerry.

NHS in move to stem data breaches The UK has made a start at shedding its reputation as a data breach hotspot with the news that 100 hospitals are to start using encrypted USB sticks from Swedish company BlockMaster.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Dell
rule

Why virtualization? Why now?
In this video, we tackle these questions, explaining how virtualization technology has become more mainstream. Businesses are under pressure to ease management and reduce costs, while retaining and enhancing competitive advantages, such as flexibility, reliability, scalability and security. Watch now to see how virtualization can help you address these demands.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/20/09

Today's most-read stories:

  1. Microsoft discloses ambitious security strategy
  2. Cisco reveals aggressive pricing for blade server system
  3. PBX killer, Voice CAL coming to OCS in 2010
  4. Black Hat 'supertalk' halted due to vendor concerns
  5. Why is Google's Schmidt still on Apple's board?
  6. Forced week off at Adobe not exactly a vacation
  7. Cisco against Buy America provisions of broadband stimulus fund
  8. Breakthrough enables Terabit Ethernet
  9. Microsoft's cloud identity platform on track
  10. H1-B demand falls sharply
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news




IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



1 comment:

  1. Anonymous7:18 PM

    І'm really impressed with your writing skills and also with the layout on your blog. Is this a paid theme or did you modify it yourself? Anyway keep up the excellent quality writing, it'ѕ rarе to
    see а gгeat blоg lіkе this one theѕe ԁаys.



    Stop by my sitе; payday loans

    ReplyDelete