Weekly analysis – 27th February 2010 to 6th March 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 27th February 2010 to 6th March 2010

Excerpted from:
Weekly analysis – 27th February 2010 to 6th March 2010

Share/Save/Bookmark

Weekly analysis – 20th February 2010 to 27th February 2010

No Comments

MillerSmiles provides its weekly phishing analysis for the week of 20th February 2010 to 27th February 2010

Originally posted here:
Weekly analysis – 20th February 2010 to 27th February 2010

Share/Save/Bookmark

Health Care Industry Finds Technological Relief: How Information Technology & Greater Connectivity is Improving Health Care

No Comments

WHEN: Thursday, June 25thTime: 10am PT / 1pm ET Join us today!>>SPONSORED BY: NortelLearn how Information Technology & greater connectivity through Unified Communications, IP telephony, m…

The rest is here:
Health Care Industry Finds Technological Relief: How Information Technology & Greater Connectivity is Improving Health Care

Share/Save/Bookmark

Health Care Industry Finds Technological Relief: How Information Technology & Greater Connectivity Are Improving Health Care

No Comments

WHEN: Thursday, June 25thTime: 10am PT / 1pm ET Join us today!>>SPONSORED BY: NortelLearn how Information Technology & greater connectivity through Unified Communications, IP telephony, m…

Read more from the original source:
Health Care Industry Finds Technological Relief: How Information Technology & Greater Connectivity Are Improving Health Care

Share/Save/Bookmark

Does Your Church Set You Up For Spam Or Viruses?

No Comments

You receive an email from your church (or at least you think it is your church) Just like all things internet, things have a way of lingering or worse yet turning out to be something malicious. Is that what you intended when you sent it out? Probably not. Here are some best practices on how to insure that email recipients have a better chance of evening opening your email and also that you won’t be exposed to unknown viruses or future spam emails.

The rest is here:
Does Your Church Set You Up For Spam Or Viruses?

Share/Save/Bookmark

IT Security Ask the Experts: Top Queries, February 2009

No Comments

This Web site was created to be a clearing house for technical IT Security queries, and we are still fielding quite a few of those. But we continue to receive a broad variety of fascinating questions …

Go here to see the original:
IT Security Ask the Experts: Top Queries, February 2009

Share/Save/Bookmark

Orkut joins the Malware gang

No Comments

“The blogosphere simply loves to slurp up social-networking traffic stats, and on Monday we got a nice tasty serving of them with some new numbers from Compete.com for the month of January,” says CNet News.

“The results? Facebook is in the lead, with about 68 million unique visitors, well ahead of MySpace’s 58 million. (The two are pegged at 1.1 billion and 810 million page views, respectively.)”

Close to the bottom at #21 is Google’s Orkut, used principally in Brazil and India, but it has another distinction.

Like many other sites on the list, , too, is now being used by cyber criminals to carry malware that can compromise a victim’s computer, says Trendlabs.

“Spoofed emails which claim to be from Orkut inform the recipient that their account has been found fake and is doing illegal activities such as sending out spam to other Orkut members,” it says, giving as an example:

Problems with your profile.

Dear user,

Your profile was reported to be containing illegal information, and will be blocked in the next 48 hours.

You are probably using non-authorized or copyrighted information.

To see all the information and instructions required to normalize your account, click here.

This will be the last notification sent from our system, and in case you do not perform any required action, your profile will be blocked definitely.

ATTENTION: your request will be analyzed by our team and will be subject for approval.

To get more details about your profile, download the software below:

Recipients, “are given 48 hours to and activate of their profile by clicking the given link,” says TrendLabs, adding:

“Upon clicking the link they will be redirected to a website where they are prompted to download a file which is found to be a malware detected as TROJ_DLOADER.WKV.”

Go here to see the original:
Orkut joins the Malware gang

Share/Save/Bookmark

Get Your Emails in Order With a Spam Block System

No Comments

Spam is a great problem nowadays and it pervades the entire world like some digital endemic we cannot escape from. There are email sniffers out there who are dedicated worms, which track the digital network for any loose email addresses. The compile a list of literally millions of emails a day based on searches through forums, e-zines, websites, databases and collectives online.

Original post:
Get Your Emails in Order With a Spam Block System

Share/Save/Bookmark

2008 data breach total soars: report

No Comments

Businesses, governments and educational institutions says there were 50% more data breaches in 2008 than in 2007 with the personal records of at least 35.7 million Americans at risk, according to a new study.

The  Identity Theft Resource Center reported 656 breaches at the end of 2008, “reflecting an increase of 47% over last year’s total of 446,” it says, going on the financial, banking and credit industries, “have remained the most proactive groups in terms of data protection over all three years”

The Government/Military category has dropped nearly 50% since 2006, moving from the highest number of breaches to the third highest, says the ITRC, but, “the business community still needs to enhance and enforce data security measures”.

Only 2.4% of all breaches had encryption or other strong protection methods in use, and only 8.5% of reported breaches had password protection, says the study.

“It is obvious that the bulk of breached data was unprotected by either encryption or even passwords,” it states, continuing:

Sadly, these trends continue to plague companies and government alike, despite education on safer information handling, new laws and regulations.   Mal-attacks, hacking and insider theft, account for 29.6% of those breaches that reported the causal factor.   Insider theft, now at 15.7%, has more than doubled between 2007 and 2008.   On the other hand, data on the move and accidental exposure, both human error categories, showed noteworthy improvement, but still account for 35.2% of those breaches that indicate cause.

Electronic breaches (82.3%) continue to outnumber paper breaches (17.7%).   While there were 35.7 million records potentially breaches according to the notification letters and information provided by breached entities, 41.9% went unreported or undisclosed making the total number of affected records an unreliable number to use for any accurate reporting.

The ITRC strongly advises all agencies and companies to:

  • Minimize personal with access to personal identifying information.
  • Require all mobile data storage devices that contain identifying information encrypt sensitive data.
  • Limit the number of people who may take information out of the workplace, and set into policy safe procedures for storage and transport.
  • When sending data or back-up records from one location to another, encrypt all data before it leaves the sender and create secure methods for storage of the information, whether electronic or paper.
  • Properly destroy all paper documents prior to disposal.   If they are in a storage unit that is relinquished, ensure that all documents are removed.
  • Verify that your server and/or any PC with sensitive information is secure at all times.   In addition to physical security, you must update anti-virus, spyware and malware software at least once a week and allow your software to update as necessary in between regular maintenance dates.
  • Train employees on safe information handling until it becomes second nature.

Original post:
2008 data breach total soars: report

Share/Save/Bookmark

How an Email Trace Can Find Spammers

No Comments

If you’ve ever been harassed by annoying spam e-mail (and who hasn’t?), then you’ve probably been a little bit curious, about who sent the spam. Quite often, the e-mail address you see in the sent field, is a misleading, or fake address. Spammers are far too clever these days, to make it that easy to track them down. The fines and penalties for spamming, are getting serious, and these guys/girls really don’t want to be found out. It’s not impossible though, to track them down, and trace your email.

More:
How an Email Trace Can Find Spammers

Share/Save/Bookmark

Older Entries