Search This Blog

Wednesday, September 23, 2009

Court to scammer: Give up your house or go to jail; Researchers overwhelming vendors with security flaws

Court to scammer: Give up your house or go to jail; Researchers overwhelming vendors with security flaws
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by Cisco
rule

Beefing up Email Security by Teaming with a Leader
Improve your email security practices after watching this Live Webcast on Wednesday, September, 30 at 1:00 p.m. ET/10:00 a.m. PT. Your email security choices extend beyond on-premise only solutions. Improve your anti-spam, visibility, content filtering and encryption support with hosted, hybrid and managed email security services.

Register for this live event now.

rule

Spotlight Story
Slideshow: 13 hot products from DEMOfall '09

In this slideshow we'll give you a handy preview of the hottest products making their debut at this year's DEMOfall show in San Diego. The selections this year run the gamut, from cloud video surveillance technology to Web 2.0 patent databases to software that helps you scope out your dates for sketchy Internet activity. Read full story

Related News:

Court to scammer: Give up your house or go to jail
Too many online scammers get away with what amounts to a wrist slap but a case if Las Vegas this week seems to be heading the right direction at least. According to the Federal Trade Commission, a business opportunity scammer has been held in contempt for the second time by a federal court and ordered to turn over the title of his home in Las Vegas or face jail time.

Researchers overwhelming vendors with security flaws
Booming numbers of security researchers are uncovering so many flaws that vendors are finding it almost impossible to patch them all in a reasonable timeframe, the latest SANS report has found.

Botnet PCs stay infected for years
A hardcore of PCs controlled by botnets stay that way for years, an analysis from security vendor Trend Micro has found.

Scammers auto-generate Twitter accounts to spread scareware
Scammers are using machine-generated Twitter accounts to post messages about trendy topics, and tempt users into clicking on a link that leads to servers hosting fake Windows antivirus software, security researchers said.

Microsoft to release identity product
My primary interest at last week's European version of The Experts Conference was Microsoft's upcoming Forefront Identity Manager 2010. If you haven't been following closely, you might know this soon to release product as Identity Lifecycle Manager (ILM) "2".

Seagate ships self-encrypting drives for enterprises
Seagate said it is offering its self-encrypting drive feature with its entire line of enterprise-class hard disk drives and that it has partnered with Intel and LSI to integrate its encryption technology with the two companies' security management firmware.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 23, 2009

MOST-READ STORIES

  1. Microsoft declares war on 'scareware'
  2. Cisco taps Microsoft exec to head collaboration
  3. The most promising games of fall 2009
  4. Dell buying Perot Systems for $3.9 billion
  5. Microsoft urges users to disable vulnerable Win net protocol
  6. 10G Ethernet shakes net design to the core
  7. Will Google Wave make the network just dumb plumbing?
  8. Are netbooks ready for the enterprise?
  9. 13 hot products from DEMOfall '09
  10. WiMAX in 2010: Too little, too late?

Live Event: Enterprise Database Security
Make the most of your existing resources without draining your IT budget with a successful database security strategy. Join Industry experts, including Noel Yuhanna, Principal Analyst at Forrester Research for this live event scheduled for Thursday, September 24 at 2 p.m. ET / 11 a.m. PT to learn how. Protect your enterprise assets and ensure regulatory compliance.
Register for this Live Event now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: