___________________________________________________________

Computerworld's Security Newsletter

     May 4, 2007
___________________________________________________________


In This Issue
-----------------
1. Editor's Note - By David Ramel - There is no wireless security threat
2. Top Story - Trojan horse impersonates Windows activation to snatch credit 
card numbers
3. Spammers use fresh technique to evade filters
4. Microsoft pencils in seven bug fixes for next week
5. Privacy groups renew push against Real ID bill
6. Florida to dump touch-screen e-voting systems

Manage Your Newsletter Subscription:
http://www.computerworld.com/action/member.do?command=newsletterLogin


********************** Advertisement ***********************

Title:  Client Side Attacks: Your Weakest Security Link

Download this webcast and learn what you can do to proactively identify, expose 
and protect your organization from human vulnerabilities within your 
organization. 

http://cwflyris.computerworld.com/t/1516096/114916/62205/0/

************************************************************


1. Editor's Note - By David Ramel - There is no wireless security threat

I've maintained for a while that 
(http://cwflyris.computerworld.com/t/1516096/114916/62206/2/) *there is no big 
wireless security problem.* I mean, no one is likely to camp out in your 
parking lot and sniff packets to find a login and password and then romp around 
in your network in hopes of finding something valuable. That's so 5 years ago. 

And why should they, when they can just waltz in to your office and pick up a 
laptop. Look at the news - it's all about data breaches, lost laptops, careless 
users.

(http://cwflyris.computerworld.com/t/1516096/114916/62207/2/) *War driving is 
done.*

What network admin in this day and age is going to set up a wireless network 
without turning on WPA and changing some defaults, which stops 99% of hackers 
in their tracks?

But take another look at the news. What's the big story on every IT site? "How 
to secure your wireless network" in dozens of permutations, regurgitated again 
and again. Hey, we do it too. And the thing is, the stories usually do pretty 
well, click-wise.

We should get off the wireless wagon and focus on physical security, policies 
to govern information dissemination -- who is allowed to access and where they 
are allowed to take it. And encryption of data. And locating lost laptops and 
wiping their data clean if they can't be recovered. And fighting Trojans and 
bots and the Web site exploit of the week and all the other more imminent 
threats.

Of course, everyone disagrees with me. They ridicule and chide and scold, but 
no one ever seems to come up with the exact techniques a wireless hacker could 
use to do some damage. And how many wireless hacks have you heard of lately?

So I'm planning a sound-off article with a co-worker, who is going to argue 
against me, taking the side that the wireless threat is indeed as dire as we 
make it out to be.

What do you think? Drop me a line. 

-- David Ramel
Editor, Computerworld's Security Channel
http://www.computerworld.com/taxonomy/000/000/000/taxonomy_000000017_index.jsp
mailto:[EMAIL PROTECTED]


********************** Other Resources *********************

End users can now be compromised by simply opening a malicious Word, Excel or 
PowerPoint document sent via email, or browsing malicious web sites that 
exploit vulnerable client-side code.  This resource from Computerworld and Core 
Security will show you how to proactively identify, expose and protect your 
organization from these threats. 
http://cwflyris.computerworld.com/t/1516096/114916/61121/0/

Turn Information into Higher Business Performance.
http://cwflyris.computerworld.com/t/1516096/114916/58697/0/

Endpoint Security Virtual Conference: This free Computerworld conference will 
focus on strategies for protecting data at the edge of your network. Register 
now.
http://cwflyris.computerworld.com/t/1516096/114916/59416/0/

Foundation Repair: The New SSL; A New Model for SSL Certificates and Browser 
Trust. Get this white paper now!
http://cwflyris.computerworld.com/t/1516096/114916/61122/0/

************************************************************


2. Top Story: Trojan horse impersonates Windows activation to snatch credit 
card numbers
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9018645
A Trojan horse making the rounds online poses as a Windows activation program 
to dupe XP users into entering credit card information to reanimate their 
computers.

3. Spammers use fresh technique to evade filters
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9018597
Taking advantage of an inability common to most anti-spam systems, spammers and 
malware purveyors are sneaking into e-mail inboxes via encrypted or 
password-protected file attachments.

4. Microsoft pencils in seven bug fixes for next week
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9018590
Microsoft plans to release seven bug fixes next Tuesday, with expectations 
centered around a security update for a DNS server zero-day flaw found in all 
editions of the company's server line.


********************** Advertisement ***********************

Survey Says: Small Organizations thinking Big about Disaster and Data 
 
Companies of 10 employees or 10,000 employees face the same challenge day in 
and day out: Protect business-critical data. But with smaller companies, 
allocating resources to this chore can be taxing. Tune into this on demand 
webcast, Survey Says: Small Organizations Thinking Big about Disaster and Data, 
to see what some 250 of your small-business peers are doing to ensure 'business 
as usual'.  

http://cwflyris.computerworld.com/t/1516096/114916/47577/0/

************************************************************


5. Privacy groups renew push against Real ID bill
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9018599
Privacy advocates are hoping to muster opposition to the controversial Real ID 
bill, which seeks to create a national standard for issuing state drivers' 
licenses and other forms of state-issued IDs.

6. Florida to dump touch-screen e-voting systems
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9018595
The Florida Legislature today voted to replace nearly all of the state's 
touch-screen voting systems with optical scan devices.


********************** Advertisement ***********************

Webcast: Secure Enterprise Search

Computerworld and Oracle invite you to a new on demand webcast on Secure 
Enterprise Search. IT must balance how to enable people to find the information 
they need to do their work, and at the same time protect the information they 
should not access. 

See how Oracle Secure Enterprise Search enables organizations to deliver 
secure, low-cost, and easy-to-deploy search solutions that eliminate 
information overload, and are as easy to use as popular Internet search 
engines. 

http://cwflyris.computerworld.com/t/1516096/114916/56432/0/

************************************************************



Manage Your Newsletter Subscription
--------------------------------------
You are subscribed to Computerworld's Security Newsletter, whose internal 
list name is: computerworld_security.

The e-mail address you are subscribed with is:

archive@mail-archive.com

To unsubscribe, change your preferences or change your e-mail address, 
please visit our Web-based subscription center:

http://www.computerworld.com/action/member.do?command=newsletterLogin

If the above URL is not clickable, please copy and paste it to your 
Web browser's address field.


Tell a Colleague or Friend About Security Newsletter
-----------------------------------------------------------
Do you know someone who might like this newsletter? Please send a 
recommendation, and pass them this convenient subscription link:

http://www.computerworld.com/action/newsletter.do?command=registerNewsletter&newsletterId=1025


Feedback
---------------
To submit feedback about this newsletter, send a message to:
mailto:[EMAIL PROTECTED]


Privacy Policy
-----------------------
Please reivew our privacy policy:
http://www.computerworld.com/action/pages.do?command=viewPage&pagePath=/about_policies


Advertising
-------------------
For information on advertising, contact Sean Weglage:
mailto:[EMAIL PROTECTED]


Try the Other Computerworld Newsletters
------------------------------------------
Did you know Computerworld has more than 45 other e-mail newsletters 
that may be of use to you?  Please visit the following Web page to 
find out more:
http://www.computerworld.com/action/member.do?command=registerNewsletters


Computerworld Inc.
http://www.computerworld.com/
One Speen Street
Framingham MA 01701

Copyright (C) 2007 Computerworld Inc.

Reply via email to