Search This Blog

Wednesday, February 25, 2009

Gmail chat invaded by phishing scam; 15 real ways to secure teleworkers

Spammers Play to Recession Fears, Emotions; VeriSign: We will support DNS security in 2011
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Dell Latitude Mainstream E6400 & E6500
Featuring dramatic innovations in performance, durability and security, Dell Latitude Mainstream laptops provide exception productivity and a low TCO

rule

Spotlight Story
Gmail chat invaded by phishing scam

Brad Reed By Brad Reed
Google's e-mail service has been invaded by a virus that is spreading itself through users' instant message accounts. Read full story

Related News:

Network World on Twitter Get our tweets and stay plugged in to networking news.

15 real ways to secure teleworkers Security continues to be one of the top bugaboos to letting employees telecommute. As gas prices have stayed high and the economy continues to drive itself into the ground, telecommuting continues to be a viable and cost-effective way for companies to keep employees connected to the home office, but at what price? Lost laptops? Network hacks? Stolen data?

Spammers Play to Recession Fears, Emotions Spammers are using the current shaky economic conditions to their advantage, according to information released Tuesday by Symantec in its February 2009 MessageLabs Intelligence Report.

VeriSign: We will support DNS security in 2011 VeriSign has promised to deploy DNS Security Extensions – known as DNSSEC – across all of its top-level domains within two years.

Gov't CIO survey: Cybersecurity still needs work Cybersecurity continues to be a top concern among U.S. government CIOs, but agencies are still falling short of achieving good security results, according to a new survey of top government IT officials.

Check Point overhauls its security software architecture Check Point is in the midst of a major overhaul of its security software architecture so customers can pick and choose the applications they want and dedicate computing...

Laid-off Workers as Data Thieves? When the depths of the economic crisis became clear last September, public relations firms started using it as an opportunity to drum up publicity for their security vendor clients. One PR flak even started her e-mail pitch to me with an admission that the IT angle was a stretch.

Why Information Must Be Destroyed The inability to discard worthless items even though they appear to have no value is known as compulsive hoarding syndrome. If the eccentric Collyer brothers had a better understanding of destruction practices, they likely would not have been killed by the very documents and newspapers they obsessively collected.

Secure Passage releases a new version of its firewall-analysis tool Secure Passage is rolling out a news version of its firewall analysis and compliance-verification software that identifies unintentionally allowed risky behavior on business networks.

Adobe flaw has been used in attacks since early January A dangerous and unpatched vulnerability in Adobe's PDF-reading software has been around a lot longer than previously realized.

Attackers targeting unpatched vulnerability in Excel 2007 Microsoft's Excel spreadsheet program has a 0-day vulnerability that attackers are exploiting on the Internet, according to security vendor Symantec.

How a small company caused Internet disruption In a startling demonstration of exactly how little it can take to disrupt the Internet, a relatively innocuous network configuration update by a small Czech company last...

Cell phone security Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Dell
rule

Dell Latitude Mainstream E6400 & E6500
Featuring dramatic innovations in performance, durability and security, Dell Latitude Mainstream laptops provide exception productivity and a low TCO

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.

 

02/25/09

Today's most-read stories:

  1. 40% of geeks surveyed really work fewer than ... say what?
  2. Techies end-run feds on DNS security
  3. Just what has DARPA accomplished in recent decades?
  4. Five fantastic open source tools for Windows admins
  5. Nortel wants to speed up $17.65M Alteon sale
  6. 2009 Best of Tests winners
  7. Conflicker worm gets an evil twin
  8. Starbucks sued after laptop data breach
  9. Fave raves: six enterprise products readers love
  10. Citrix drops price of hypervisor to zero


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: