From security@enews.eweek.com Tue Jul 25 15:07:03 2006 Return-Path: Received: from source ([72.2.38.5]) by exprod7mx56.postini.com ([64.18.6.14]) with SMTP; Tue, 25 Jul 2006 15:06:52 EDT Content-Transfer-Encoding: 7bit Content-Type: multipart/alternative; boundary="_----------=_115385418419574725" MIME-Version: 1.0 X-Mailer: MIME::Lite 2.117 (F2.6) Date: Tue, 25 Jul 2006 19:03:04 UT To: xxxxxxxxxxx@xxx.xxx.xxx From: Securing The Enterprise Reply-To: security@enews.eweek.com Subject: Wasted Spam Bits and the Lazy/Stupid Factor; Bugle Goes Googling for Source Code Flaws Message-Id: Content-Length: 31574 This is a multi-part message in MIME format. --_----------=_115385418419574725 Content-Disposition: inline Content-Type: text/html Content-Transfer-Encoding: 8bit eWeek: Securing The Enterprise
 

eWEEK.com
  Securing The Enterprise
      HOME    |    NEWS    |    REVIEWS    |    OPINIONS    |    CASE STUDIES    |    RESEARCH    |    TOOLS    |    JOB SEARCH
 July 25, 2006

Sponsored by AMD

AMD Next-Generation Processing Solutions
AMD is addressing growing power challenges with
processing solutions that are innovative and incredibly
efficient. This includes leading processor performance-
per-watt, a multi-core roadmap, and virtualization
initiatives.
http://enterpriseevent.amd.com/momentum


      I N   T H I S   I S S U E

Larry Seltzer: Wasted Spam Bits and the Lazy/Stupid Factor
News: Bugle Goes Googling for Source Code Flaws
Podcast: Malware Targets Social Networks
News: U.S., China Serving Up More Spam
Tech Analysis: eWEEK Labs: 802.11n Is a Gamble
News: Exploit Code Published for Windows Worm Hole
News: Computer Viruses Reach into Corporate Pocketbooks

For the latest in enterprise security, bookmark eWEEK.com's Security Topic Center.



Author Photo
Larry Seltzer: Security Update
Wasted Spam Bits and the Lazy/Stupid Factor
Spammers can't be bothered to write proper software or clean up their lists, and the Internet is thus filled with phantom bits that can do nothing but clog the wires.

Read the rest of Larry's column.



News: Bugle Goes Googling for Source Code Flaws
A source code reviewer in London is working on a project to collect search queries that can be used to identify some of the most common vulnerabilities in open-source code indexed by Google. Learn about the project.



Podcast: Malware Targets Social Networks
In this OnSecurity podcast, eWEEK senior writer Ryan Naraine talks with Amol Sarwate, manager of the vulnerability lab at Qualys to talk about the latest surge in malicious hacker activity on social networking sites and the zero-day attack trends targeting Microsoft Office applications. Listen in.



News: U.S., China Serving Up More Spam
The United States may be slipping in the battle against spam e-mail, while spam production is increasing in Southeast Asia, according to a report from anti-virus vendor Sophos. What else did the report find?



Tech Analysis: eWEEK Labs: 802.11n Is a Gamble
The newest wireless LAN specification-802.11n-isn't ratified yet, but that's not stopping vendors from releasing products based on a draft version of it. Is this gear worth the gamble? Not if you expect your wireless experience to be easy, reliable or consistent. Not if you expect your wireless experience to be easy, reliable or consistent.



News: Exploit Code Published for Windows Worm Hole
Millions of Windows users are at risk of PC takeover attacks after exploit code is released for a "critical" DHCP vulnerability. Get the details.



News: Computer Viruses Reach into Corporate Pocketbooks
According to a report by the Computer Security Institute and the FBI, corporations are losing more money to viruses than to any other type of IT attack, while unauthorized network access, stolen laptops and IP theft are also costing U.S. companies millions. Read more.

Free White Paper  |   Brought to you by WebEx Communications
Desktop Management: Getting it Right

Secure and protect PC assets for less cost. WebEx System Management ensures quality asset management, software and patch distribution, virus protection, and backup management.

Download this complimentary white paper now to learn more!


 Free Download from Ziff Davis Web Buyer's Guide      Sponsored Listing
Speed up your systems with NEW Diskeeper 10 - Try it free! from Diskeeper Corporation

Diskeeper, the Number One Automatic Defragmenter is designed to run transparently in the background and keeps your PCs and servers defragmented while they are in use. Diskeeper completely handles the problems of disk fragmentation, so you get maximum speed and stability from your systems. Download Diskeeper Trialware for Networks, a free fully-functional 30-day trial edition of all Diskeeper workstation and server editions as well as the Diskeeper Administrator for centralized administration. You'll see first-hand the performance gains that automatic defragmentation brings!

Download now!




eNewsletter Information
You are subscribed to eWEEK's Securing The Enterprise with the email address xxxxxxxxxxx@xxx.xxx.xxx. Click here to unsubscribe from this newsletter.

To subscribe to other e-mail newsletters from Ziff Davis, change your delivery format from HTML to text, or change your email address, click here.



Copyright © 2006 Ziff Davis Media, Inc. All Rights Reserved.
Ziff Davis Media Inc., 28 East 28th Street, New York, NY 10016



eSEMINARS

Virtualize your IT Environment and Cut Costs
7/25 Attend this interactive eSeminar and discover the powerful advantages of virtualization. Register Now

Evolving your Enterprise through Open Source
7/26 Find out how combining Open Source and Real-Time Infrastructure (RTI) can create a virtualized environment that addresses the critical infrastructure requirements businesses demand. Register Now


FREE ONLINE NEWSLETTERS
eWeek Compliance
Channel Insider
Publish World Update
LinuxDevice Weekly
eSeminars Update
Tech Saver
HTML Text
Email address:

SPECIAL MAGAZINE OFFER

SPONSORED CONTENT


ZIFF DAVIS ENTERPRISE TOOLS

Get the latest tools to help you calculate ROI, business costs and more!

Calculating an Outsourcing Ratio Download now.

The Return on Voice over IP Migration Download now.

Break-Even Point for Search Tools Download now.

The Return on Consolidating Data Centers Download now.

More Downloads >>


ZIFF DAVIS INTERNET PODCASTS

ZIFF DAVIS SPOTLIGHT

ServerIQ: Give Up Your Admin Rights to Save Your Network By developing a strategy where administrators are limited in their permissions, you can greatly enhance security. Read more!

ServerIQ: Microsoft Confirms Excel Zero-Day Attack Under Way Microsoft confirms a Windows customer is the target of an attack against a new, undocumented Excel spreadsheet vulnerability. Read more!


ONLINE CLASSIFIEDS

WEB BUYER'S GUIDE
FIND SECURITY PRODUCTS:
Anti-Virus
Firewalls
Intrusion Detection
Spam Filtering
Spyware

ALL PRODUCTS

--_----------=_115385418419574725--