Monday, August 29, 2005

Today's News: Worm, spyware writers nabbed

SearchSecurity.com: Security Wire Daily
Breaking security news, the latest industry developments and trends
August 29, 2005
___________________________________

ISSUE SPONSORED BY: The Compliance Conundrum: Email Security White
Paper

.....................................................................
IN THIS ISSUE

-- NEWS: Zotob investigation leads to two arrests
-- NEWS: No love lost for this indicted spyware maker and these
buyers
-- NEWS: Dos and don'ts: Ensuring apps security from the get-go
-- BLOG: Mad as Hell XII
-- LEARNING RESOURCES: SearchSecurity.com's Learning Guide Library
-- POP QUIZ: Intrusion detection systems

HEADLINES
---------------------------------------------------------------------

NEWS: ZOTOB INVESTIGATION LEADS TO TWO ARRESTS
Officials from Microsoft and the FBI say two men -- one from Turkey,
the other from Morocco -- have been arrested in connection with this
month's Plug and Play attacks.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1119840,00.html?track=NL-102&ad=525689

MORE INFO:

Read more about the impact of the Zotob worms
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1116775,00.html?track=NL-102&ad=525689

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

The Compliance Conundrum: Email Security White Paper

Federal legislation targeting the dissemination of private
information has forced businesses to rethink how they communicate. As
e-mail has become the most important communication tool for any
organization, care must be taken to ensure that all messages are
within the realm of legally appropriate interaction. Download
CipherTrust's free white paper to learn how e-mail security
contributes to regulatory compliance.
Click Here:
http://ad.doubleclick.net/adi/ssec/em;pos=2;emc=39;gci=525689;sz=1x1;ptile=2;ord=127141472?tt=1

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

NEWS: NO LOVE LOST FOR THIS INDICTED SPYWARE MAKER AND THESE BUYERS
Modified private-detective program used to nab cheating mates leads
to arrests for computer hacking.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1119982,00.html?track=NL-102&ad=525689

NEWS: DOS AND DON'TS: ENSURING APPS SECURITY FROM THE GET-GO |
SearchEnterpriseLinux.com
Closing the gap between developers and users is the first step toward
making sure applications are secure.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1119248,00.html?track=NL-102&ad=525689

ALSO ON SEARCHSECURITY.COM
---------------------------------------------------------------------

BLOG: MAD AS HELL XII
Winn Schwartau "geeks around" about the pros and cons of IPv6.
http://searchsecurity.techtarget.com/columnItem/0,294698,sid14_gci1118646,00.html?track=NL-102&ad=525689

LEARNING RESOURCES: SEARCHSECURITY.COM'S LEARNING GUIDE LIBRARY
Visit our Security Learning Guide Library and find a collection of
guides designed to be your one-stop shop for learning about specific
security topics.
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1119344,00.html?track=NL-102&ad=525689

POP QUIZ: INTRUSION DETECTION SYSTEMS
At which two traffic layers do most commercial IDSes generate
signatures?
a. application layer
b. network layer
c. session layer
d. transport layer
Answer:
http://searchsecurity.techtarget.com/general/0,295582,sid14_gci1119565,00.html?track=NL-102&ad=525689#answer5
Take the full quiz:
http://searchsecurity.techtarget.com/generic/0,295582,sid14_gci1119566,00.html?track=NL-102&ad=525689&bucket=REF

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:gderussy@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:cferraro@techtarget.com


---------------------- FREE E-NEWSLETTERS! ----------------------
SearchSecurity: Network Security Tactics
SearchSecurity: Security Wire Perspectives
SearchSecurity: Threat Monitor

Click here to subscribe:
http://searchSecurity.techtarget.com/tieredRegPage?track=NL-102&ad=525689&val=0&newsletters=796243&newsletters=936462&newsletters=1071165&email=pet.computter@gmail.com

:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by SearchSecurity.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Security Wire Daily":

Go to unsubscribe: http://SearchSecurity.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=525689&track=NL-102

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
SearchSecurity
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494