Plus: settling with crooks; malware as a service; more.
Plus: Arp spoofing strikes CISRT; how copper thieves can pose threats to your systems.
Vulnerabilities in products from Cisco, Sun Java and Nagios can help hackers into systems via less obvious methods if IT doesn't think creatively.
Plus: Check Point BOF; zombies and botnets; and rootkits
Despite rise in malware, poll says fewer users prone to being infected. Also: hacking 911, phishing for fun and old hard drives and data.
Plus: Hackers working together to steal your identity; AIM hack just needs you to be logged in to work.
Flaws in VMware's products have been patched. Also, Apple WiFi hack gets published; inside reputation-based attacks.
VBP files might not be as they seem. Plus: MySpace ad fix; Max Vision gets locked up.
Hackers breach bank's site with barrage of exploits. Plus: unhealthy security policies and data-filled
hard drives on eBay.
Another tool to fight the criminals lurking on the Internet. Plus: DNS 'pinning'; Atsiv driver rejection; more.
Computer Fraud and Abuse Act can't be used against employees who access data and take that information to competitors. Plus: Beware of debit-only ATMs.
Research project creates tool to seek and kill bots; homeland power threat guidelines; server attack vector in Confixx.
Also: Trusting TRUSTe; FTC's down on P2P; a policy for encrypting thumb drives
Plus Citrix flaw, Boing document theft and what Prevx tracked on recent Trojan attacks.