Search This Blog

Monday, June 29, 2009

Fake Microsoft Update Email Scam - That almost looks professional!

With 46 security fixes, the iPhone Is enterprise ready now!?; 90 data breaches in 2008: What went wrong
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile


Sponsored by ASG
rule

Strategies to Cut Applications Costs
Application mining tools have the power to decrease costs, increase developer productivity, and enhance application quality — as long as you make informed buying decisions. This white paper explains how to evaluate application mining tools for your own business case and features an ROI calculator to help you quantify the benefits.

rule

Spotlight Story
Fake Microsoft Update Email Scam - That almost looks professional!

Tyson Kopczynski, Hidden Microsoft: For the past couple of days my inbox has received several emails claiming to be from Microsoft asking me to update Outlook and Outlook Express. I was surprised at the level of effort that the sender went through in making this phishing scam look more authentic. Read full story

Related News:

With 46 security fixes, the iPhone Is enterprise ready now!?
Jamey Heary: Believe it or not, the recent disclosure of 46 new security fixes in iPhone 3.0 is actually part of the proof the iPhone is ready for enterprise adoption.

90 data breaches in 2008: What went wrong
Data breaches continue to plague organizations in virtually every industry. Since 2004, the Verizon Business RISK Team has worked on more than 600 investigations of suspected breaches. Fortunately for us, the team is willing to share its collective knowledge and provide an analysis of the trends in breaches, including how they happen and what the root causes and contributing factors are.

Out of business, Clear may sell customer data
Three days after ceasing operations, owners of the Clear airport security screening service acknowledged that their database of sensitive customer information may end up in someone else's hands, but only if it goes to a similar provider, authorized by the U.S. Transportation Security Administration.

IBM touts encryption innovation
IBM today is saying one of its researchers has made it possible for computer systems to perform calculations on encrypted data without decrypting it. While that sounds somewhat counterintuitive and complicated, IBM says the breakthrough would let computer services, such as Google or others storing the confidential, electronic data of others will be able to fully analyze data on their clients' behalf without expensive interaction with the client and without actually seeing any of the private data.

Scareware peddlers will only fork over $116,000 of $1.9M settlement
Two defendants charged in a massive scareware scheme will reconcile Federal Trade Commission charges and give up more than $116,000 in assets as part of an original $1.9 million settlement.

June Giveaways
Cisco Subnet and Microsoft Subnet are giving away training from Global Knowledge to two lucky readers and 15 copies each of books on IPv6 security, the Cisco Secure Firewall Services Module, and Active Directory Domain Services 2008. Deadline for entries June 30.

Network World on Twitter? You bet we are


VMware's vSphere reviewed
vSphereWe found 5 things to love and 5 things to hate about VMware's vSphere.

Take the quiz
IT quizAre you a net know-it-all? Prove it.

Next-Generation Data Centers
IT transformation begins at the data center, as enterprises embrace technologies such as virtualization and cloud computing to build adaptable, flexible and highly efficient infrastructures capable of handling today's business demands.
Next-Generation Data Centers


 

June 29, 2009

TOP STORIES | MOST DUGG STORIES

  1. IBM supercomputer to heat university buildings
  2. It turns out most every technology 'is like crack'
  3. Nortel: Why Avaya?
  4. T-Mobile's Android-powered myTouch 3G due in August
  5. Cisco sends employees home to work
  6. Google begins sending out Google Voice invites
  7. Nortel lays off execs connected to Microsoft ICA partnership
  8. Experts Only: Time to ditch the antivirus?
  9. It's a sale, Windows 7 for $50, for two weeks only
  10. Avaya reportedly offering $500M for Nortel enterprise biz

Keep Storage Costs in Check with Tape
The Clipper Group outlines the real costs of migrating to a disk-based storage. You will learn about the dramatic differences between tape-based and disk-based storage in regards to floor space, hardware and energy costs. Find out why tape storage, especially, LTO-4, should be part of your long-term storage plans.
Keep Storage Costs in Check with Tape



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: