Nasty banking Trojan makes mules of victims A sophisticated Trojan horse program designed to empty bank accounts has a new trick up its sleeve: It lies to investigators about where the money is going. FBI says trio of terrorism e-mails are bunk The FBI today warned that three separate e-mails making the rounds that promise access to FBI terrorism reports are nothing more than malicious software looking to steal your personal information. The three scam-mails are: Review: HP blade takes a stab at Cisco HP has an alternative to the many security appliances that combine firewall, intrusion detection and VPN functions: Just put a single blade in the vendor's ProCurve switch and be done with it. HP security blade scores impressive performance results for UDP traffic Want to get the highest possible performance out of your security device? Make sure it only handles connectionless UDP traffic the stuff that, according to studies from CAIDA and other sources makes up less than 5 percent of traffic on Internet backbones. Gmail, Yahoo Mail join Hotmail; passwords exposed Google's Gmail and Yahoo's Mail were also hit by a large-scale phishing attack, perhaps the same one that snagged at least 10,000 passwords from Microsoft's Windows Live Hotmail. Bitbucket's downtime is a cautionary cloud tale Bitbucket's weekend troubles with Amazon's cloud services are instructive, but don't necessarily indicate a problem with cloud security. After attacks, Adobe patches now come faster Hackers like Adobe Systems, and now the company knows it all too well. How to stop IT managers from going rogue Nearly half of all data breaches come from inside an organization, which is why industry watchers say enterprise IT departments need to invest in technology that ensures no one person has all the power. Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment