Search This Blog

Thursday, May 07, 2009

Image spam returns with a vengeance; The good cyberattack

Spammers resurrect tactic to pitch pills this time, not shady stocks
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

Spotlight Story
Image spam returns with a vengeance

By Gregg Keizer
Spammers have turned back the clock and are recycling a years-old tactic by planting their messages in images, a security researcher warned Wednesday. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

The good cyberattack NRC report deals with policy issues of the United States mounting cyberattacks on bad guys, other countries.

Post-breach, Heartland plans aggressive encryption project Heartland Payment Systems intends to deploy end-to-end encryption with its merchants to protect its payment processing system from cybercriminals.

'Hacker' threatens to expose health data, demands $10M Days after a hacker claimed to have broken into a database and encrypted millions of prescription records at Virginia's Department of Health Professions, it remains unclear what happened.

Cellcrypt for BlackBerry Secures Cellular Voice Conversation The BlackBerry platform is known for its impressive security safeguards; Research In Motion's (RIM) BlackBerry Enterprise Server (BES) is literally designed from the ground up to meet enterprise security needs, and its various international security certifications attest to its effectiveness. However, there's one component of the BlackBerry ecosystem that's largely unguarded from potential threats: phone calls, i.e., voice traffic.

SOA Security: How Irish Luck Went a Long Way From a security perspective, service oriented architecture (SOA) is a tricky thing. It's not hard for bad guys to compromise it with SQL injection, capture-replay and XML denial-of-service attacks, which they can ultimately use to bust through walls around a company database.

Video: Inside the Enigma: Not a Riddle Neal Weinberg gets a special sneak peek inside the Enigma device, which was used by the Allies in World War II to help crack German codes.

IPv6 security guru fields questions Although he acknowledges that businesses have yet to embrace IPv6, security guru Scott Hogg says that doesn't mean IT executives can ignore the security problems that the next generation Internet protocol can present. After all, he notes, operating systems such as Microsoft Vista and Linux are already IPv6 capable and thus any networks that use them might be handling IPv6 traffic without their operators' knowledge.

Sweden may prosecute Cisco hacker The Swedish man indicted by U.S. authorities for the alleged 2004 theft of source code for Cisco's IOS software may be prosecuted in his home country.

Swedish man indicted in 2004 Cisco code theft A Swedish man was indicted on Tuesday in connection with the alleged 2004 theft of source code for Cisco Systems' IOS (Internetwork Operating System) software.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by NetScout
rule

Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

05/07/09

Today's most-read stories:

  1. The Internet sky really is falling
  2. Utility's plan to lessen fire risk it caused?
  3. Sweden may prosecute Cisco hacker
  4. Death of the mouse
  5. Why BlackBerry still beats iPhone for some
  6. Top 7 reasons people quit Linux
  7. Increasing Internet security for average users
  8. IPv6 security guru fields questions
  9. Domain name company cries croc tears over 'censorship'
  10. Holy Grail VMware bug: jump through a Windows VM, control the host
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: