Search This Blog

Friday, May 14, 2010

Worst phishing menace may be prepping more dangerous version of itself

Another Security "Must Read" | Microsoft's May Patch Tuesday: Tiny but potent

Network World Security

Forward this to a Friend >>>


Worst phishing menace may be prepping more dangerous version of itself
The single most active group for stealing identities and pilfering electronic bank accounts over the Internet has nearly ground to a halt, but the lull could be the precursor to an even worse crime spree, according to a new study. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

WHITE PAPER: Sophos

Best practices for implementing Windows 7
If you're planning to roll out Windows 7, now is the time to review your endpoint and data protection strategies to make sure that you're taking full advantage of the new security features as well as enhancing your overall security for enterprise deployments. Read Now.

Another Security "Must Read"
After finishing Joseph Menn's book, "Fatal System Error," a few months ago, I blogged about the book's value. This is a no-nonsense profile of the world of cybercrime that anyone associated with cybersecurity policy or practice should read. I've heard similar things about Richard Clarke's new book, "Cyberwar," and am awaiting the shipment of my copy soon. Read More

Microsoft's May Patch Tuesday: Tiny but potent
It's not the quantity of the security updates issued by Microsoft on Patch Tuesday, but the quality, according to security industry watchers. Microsoft's May seemingly skimpy release of two security bulletins could give IT managers a false sense of security, especially considering one of the vulnerabilities could live on post-patching in third-party applications.Microsoft goes small for next week's... Read More

Cisco PGW softswitch susceptible to crash, DoS
Cisco's PGW 2200 softswitch line is susceptible to multiple vulnerabilities, including system crash and denial of service. The vulnerabilities were disclosed in a Cisco security advisory this week. Read More

Report blames 'Avalanche' group for most phishing
A new report blames a single Eastern European gang for about two-thirds of all phishing attempts conducted in the last half of 2009. Read More


WHITE PAPER: Citrix Systems

Tolly Group Performance Report
Tolly Report: "Citrix NetScaler with nCore Outperforms F5 BIG-IP" shows you how Citrix NetScaler beat F5 in head-to-head tests - providing 3X faster Web traffic, lower latency and higher throughput. Learn More!

Remains of the Day: Facebook watches, Letterman switches
Don't consider your day complete until you have clicked on each and every one of these links, carefully hand-picked for your reading enjoyment by the editors of Macworld. And believe me, we will know if you haven't. (Okay, maybe we won't, but Facebook sure will.) Read More

Budget 2010: Embattled Doc Verification Scheme gets $23.6m
Another $23.6 million has been poured into identity security policy to refill the coffers of the struggling national Document Verification Service (nDVS). Read More

QLD to begin trialing biometric licences in August
Queensland's new driver licence will utilise high-end facial recognition technology in a bid to stamp out fraud and identity theft in the state. Read More

Facebook Backlash Intensifies: What Will You Do?
Things are getting uglier and uglier for Facebook, as the social networking site continues to feel the heat from those upset about its privacy policies. The site is scrambling to defend itself, planning an all-hands privacy summit for Thursday afternoon, and hiring an ex-Bush administration regulator to defend its privacy policies. Read More


WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

Real legal issues with virtual currencies
"Points," "coins," "bucks" and other forms of virtual currency are becoming standard offerings for online game sites, social media sites, retailers and other businesses. Virtual currency systems generate revenue, provide low cost alternatives to credit cards for micropayments, offer prepaid solutions appealing to youth and other users without credit cards, and help companies build attractive loyalty programs. Read More

Identity Finder
My laptop was a ticking time bomb. Read More

Microsoft's Windows Phone 7 moves toward final release
Developers and hackers are digging into the latest refresh of the Windows Phone 7 platform from Microsoft. The radically redesigned OS is still on track for Fall release on a new crop of smartphones Read More

Inside Sourcefire's Vulnerability Research Team
In many IT security shops, administrators rely on open-source tools to keep up with the malware bad guys continue to toss their way. One industry favorite is Sourcefire, parent of the Snort IDS tool and ClamAV. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Geeky Weddings, Birthdays, and Funerals
If you've ever dreamed of marrying a video-game character, having your ashes put in a computer, or holding your wedding on the deck of Star Trek's USS Enterprise, you're not alone.

2010 'Geek and Tech' Summer Movie Preview
It's summer movie time again, time for the movie studios to trot out its blockbusters with explosions and all sorts of fun. Here's our picks for the favorite movies that techies and geeks (comic book fans, unite!) will be lining up for.

MOST-READ STORIES

  1. Yahoo's ingenious plan to force users to switch to Gmail
  2. Microsoft's Windows Phone 7 moves toward final release
  3. Yet another iPhone 4G prototype revealed
  4. How Android hit the big time in the smartphone OS market
  5. How a Google tablet could avoid same fate as the Nexus One
  6. VMware is dead, long live VMware!
  7. 14 ways to supercharge your smartphone
  8. Juniper to disclose cloud plans: report
  9. Bladeless wind turbine gains patent, now looks for lift
  10. Apple iPhone 4G leak: Video reveals new design

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: