Spam blights e-mail 15 years on
,----[ Quote ]
| More than 90% of all e-mail is spam, according to anti-spam body Spamhaus.
|
| "Spam is a real life arms race," said Mark Sunner, chief analyst at online
| security firm Message Labs.
|
| Billions of spam e-mails are sent each day, blocking mail servers, slowing
| down networks, infecting people's computers with viruses, helping hijack
| machines and generally making the internet a painful experience for many.
`----
http://news.bbc.co.uk/1/hi/technology/7322615.stm
No April Fools'--Storm worm is back
,----[ Quote ]
| The compromised computer will then install the downloaded file as C:
| \WINDOWS\aromis.exe. Nazario reports that the botnet file opens the firewall
| using the netsh firewall set command, makes a lot of outbound connections,
| then listens on a random UDP port.
`----
http://www.news.com/8301-10789_3-9906880-57.html?part=rss&subj=news&tag=2547-1_3-0-20
Recent:
What spooks Microsoft's chief security advisor
,----[ Quote ]
| Speaking at the Boston SecureWorld conference Wednesday, the 19-year
| Microsoft veteran whose job includes protecting enterprises, developers and
| Microsoft itself said there actually is plenty of good news on the security
| front. For example, his outfit scans a half million devices (with customer
| permission) per month and in the first half of last year saw the first
| period-over-period decline in new vulnerabilities disclosed across Microsoft
| and non-Microsoft software since 2003.
|
| However, 3,400 new vulnerabilities were discovered and “it’s still a big
| number,” Arsenault says. “So if vulnerability rates are down, where are
| they?”
`----
http://www.networkworld.com/news/2008/032608-microsoft-security-concerns.html
Websense Security Labs first to discover vulnerability within Microsoft Office
,----[ Quote ]
| This vulnerability allows code execution within an Excel document without the
| knowledge of the user.
`----
http://www.itweb.co.za/sections/software/2008/0803270807.asp?A=VIR&S=Virus%20Watch&O=FPIN
Bots rule in cyberspace
,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
http://www.usatoday.com/tech/news/computersecurity/2008-03-16-computer-botnets_N.htm
Botnet farmers play the international exchange game
,----[ Quote ]
| Selling "installs" is a common practice in the cyber-underworld, the most
| notable example being in 2005 when Jeanson Ancheta was arrested for building
| a 400,000-strong botnet and installing adware from 180 solutions for a fee of
| $60,000.
`----
http://www.channelregister.co.uk/2008/03/19/botnet_spyware_scam/
With Vista breached, Linux unbeaten in hacking contest
,----[ Quote ]
| The MacBook Air went first; a tiny Fujitsu laptop running Vista was hacked on
| the last day of the contest; but it was Linux, running on a Sony Vaio, that
| remained undefeated as conference organizers ended a three-way computer
| hacking challenge Friday at the CanSecWest conference.
`----
http://www.linuxworld.com/news/2008/032908-with-vista-breached-linux-unbeaten.html?fsrc=rss-linux-news
|
|