Friday, October 02, 2009

Facebook CAPTCHA no match for spyware attack

FBI warns of social networking fraud, malware escalation; Independent tester: Security Essentials 'very good'
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Sunbelt Software
rule

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.

Read Now

rule

Spotlight Story
Facebook CAPTCHA no match for spyware attack

Hackers have found a way to create automated Facebook pages and are using them to spread spyware to unsuspecting users, says antivirus and Internet security firm AVG Technologies. Read full story

Related News:

FBI warns of social networking fraud, malware escalation
Fraudsters are targeting social networking sites with increased frequency and users need to take precautions, the FBI warned.

Independent tester: Security Essentials 'very good'
Microsoft's free Security Essentials antivirus software identified 98% of over half a million malware samples, an accuracy rating an independent testing company called "very good" today.

Data Security Demands the Whole Enchilada
I'm here in Washington this week speaking to multiple groups of people about cybersecurity. One of the biggest priorities that keeps coming up is data privacy and security. Like the private sector, Federal Agencies struggle with data discovery, classification, confidentiality, integrity, and availability.

Applying the science of persuasion to security awareness
Do you ever wonder whether all those security-awareness posters, coffee mugs, pens, mouse pads, and sandwich-bag clips are having any effect at all to improve security?

Microsoft blackballs pirates from Security Essentials
Microsoft will block users running counterfeit copies of Windows from installing the free Security Essentials antivirus software, the head of the company's anti-piracy group said Tuesday.

Large Scale NAT Architectures
Traditional NAT, as discussed in the previous article, has been used for fifteen or so years to enable the sharing of a small number of public IPv4 addresses by a larger number of privately-addressed devices. In the case of home and small businesses, there is usually just a single public IPv4 address on the outside NAT interface. That public address is assigned by a broadband service provider. Read...

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 02, 2009

MOST-READ STORIES

  1. Top Microsoft execs outline 2010 challenges
  2. Cell towers that blend vs. those that offend
  3. Google Wave invite-only preview begins
  4. Windows 7: 10 things that still need fixing
  5. Cisco unveils data center blade switch
  6. Microsoft releases Security Essentials antimalware tool
  7. Verizon CTO: 'We told you so' about FiOS
  8. Rivals mock Microsoft's free security software
  9. Are femtocells poaching on wired nets?
  10. Fighting Conficker

Webcast: When Good Applications Go Bad
Register today to hear Andrew Jaquith, Senior Analyst at Forrester Research, and Anthony James, VP Products at Fortinet, discuss the challenges posed to enterprises by application security threats. Additionally, hear a customer testimonial on how CKE Restaurants, responsible for operating many of the USA's most popular quick-service and fast-casual dining restaurants, reduced the risk of application-borne threats.
Register now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment