Thursday, September 01, 2005

'Loverspy' Program Creator Indicted, On The Run

___________________________________________________________
Computerworld Security Update
September 1, 2005
___________________________________________________________

***************SPONSOR**************************************

IT security without compromise

Explore proven leadership approaches to IT security as leading experts
from Cisco Systems and Microsolved discuss how to implement a
comprehensive, integrated security architecture. Find out more, watch
now.
http://www.accelacomm.com/jlp/cwnlfiller/11/10004498/

************************************************************

In this issue:

* 'Loverspy' Program Creator Indicted, On The Run
* Zotob Arrests Point To Cybercrime Nexus
* Distance Detection May Help Secure Wi-Fi
* HP Warns Of Flaw In Network Management Product
* Linux/Unix E-mail Flaw Leaves Systems Open To Attack
* Lynn's Actions At Black Hat Weren't Noble
* More Charges For L.A. Man In ChoicePoint ID Theft
* UPS Deploys New Customs Security Technology
* Microsoft Adds Antiphishing Tool To IE
* Secunia: Malware May Hide Behind Long Names In Windows Registry

Computerworld Blogs:

* A brief primer on being prepared
* Now you see it, now you don't
* Instant way to malware!

____________________________________________________________

'Loverspy' Program Creator Indicted, On The Run

Carlos Enrique Perez-Melara, the creator of Loverspy spyware software,
has been indicted for allegedly violating U.S. computer privacy laws.

http://www.computerworld.com/newsletter/0,4902,104249,00.html?nlid=SEC2

____________________________________________________________

Zotob Arrests Point To Cybercrime Nexus

The recent arrests in the Zotob worm case highlights the growing nexus
between virus writers and criminal gangs, according to security experts
and an FBI official.

http://www.computerworld.com/newsletter/0,4902,104269,00.html?nlid=SEC2

____________________________________________________________

Distance Detection May Help Secure Wi-Fi

Precision location technology is one of several key ideas for the next
few years that Intel showed off during a keynote presentation on the
last day of the Fall Intel Developer Forum.

http://www.computerworld.com/newsletter/0,4902,104242,00.html?nlid=SEC2

____________________________________________________________

HP Warns Of Flaw In Network Management Product

Hewlett-Packard is warning companies that use Network Node Manager, an
HP OpenView product, of a "high risk" flaw in the software that could
allow remote attacks.

http://www.computerworld.com/newsletter/0,4902,104257,00.html?nlid=SEC2

____________________________________________________________

Linux/Unix E-mail Flaw Leaves Systems Open To Attack

The bugs affect Elm, a venerable e-mail client still used by many Linux
and Unix sysadmins, and Mplayer, a cross-platform movie player that is
one of the most popular of its kind on Linux.

http://www.computerworld.com/newsletter/0,4902,104260,00.html?nlid=SEC2

***************SPONSOR**************************************

The Grid Computing Glossary

Like any technology, grid computing has a specialized lexicon of terms,
acronyms, and concepts. This comprehensive glossary provides a
definition of grid-related terms.

http://www.computerworld.com/ads/go2/15823186.html

************************************************************

Lynn's Actions At Black Hat Weren't Noble

Opinion: Ira Winkler says the Black Hat presentation on a Cisco
vulnerability is really about the theft of intellectual property.

http://www.computerworld.com/newsletter/0,4902,104274,00.html?nlid=SEC2

____________________________________________________________

More Charges For L.A. Man In ChoicePoint ID Theft

Oluwatunji Oluwatosin, the North Hollywood man already sentenced to 16
months in prison in the ChoicePoint ID theft case, faces an additional
22 counts, prosecutors said.

http://www.computerworld.com/newsletter/0,4902,104276,00.html?nlid=SEC2

____________________________________________________________

UPS Deploys New Customs Security Technology

UPS has deployed a trade-processing system developed by U.S. Customs
and Border Protection that's part of an overall effort to modernize and
streamline the flow of information about cross-border commerce.

http://www.computerworld.com/newsletter/0,4902,104284,00.html?nlid=SEC2

____________________________________________________________

Microsoft Adds Antiphishing Tool To IE

Microsoft is expected to release an add-in for its MSN Search Toolbar
designed to detect whether users are landing on phishing sites.

http://www.computerworld.com/newsletter/0,4902,104287,00.html?nlid=SEC2

____________________________________________________________

Secunia: Malware May Hide Behind Long Names In Windows Registry

An error in how the Windows Registry Editor Utility handles long string
names could allow malware to lurk undetected on updated and patched
Windows systems, according to IT security company Secunia.

http://www.computerworld.com/newsletter/0,4902,104254,00.html?nlid=SEC2

***************SPONSOR**************************************

The Nokia 9300

Learn the fundamentals of mobile device security. Aimed at IT
professionals and decision makers who must provide secure mobile access
to corporate data systems, this paper focuses on the security and
device management features of the most advanced Nokia business devices
- the Nokia 9300 smartphone and Nokia 9500 Communicator.

http://www.computerworld.com/nokia/communicator

************************************************************

COMPUTERWORLD BLOGS
-----------------------------------

A brief primer on being prepared

Somebody asked me the other day, will there ever be an attack on the Internet on
such a grand scale that it would be brought to its knees? Not likely; however
being prepared and planning for business continuity is still a must,
nonetheless. When doing so, your aim is to be prepared for a variety of threats
such as malware, hack attacks (originating both internally and externally), ...

http://www.computerworld.com/blogs/node/895?NLT_SEC

____________________________________________________________

Now you see it, now you don't

I wasn't too surprised about one of the latest security vulnerabilities
discovered in Windows. Apparently, this vulnerability makes it possible for
malware to hide strings in the "Run" registry key by exploiting an error in the
Registry Editor Utility (regedit.exe) when its ...

http://www.computerworld.com/blogs/node/887?NLT_SEC

____________________________________________________________

Instant way to malware!

This CW article is a must read for anyone considering allowing IM in the
workplace. The use of IM in the workplace raises serious security concerns</a>
as it can sometimes bypass corporate firewalls, ...

http://www.computerworld.com/blogs/node/879?NLT_SEC

COMPUTERWORLD MARKETPLACE
-------------------------

Enterprise Secure Instant Messaging
See why Pepsi, iPass and others rely on Omnipod. Safe interoperability
with consumer IM. Complete end-to-end security, management and control
over your enterprise instant messaging. SEC, NASD and HIPAA compliant.
Risk Free 30-day Test Drive.
http://newsletter.industrybrains.com/c?47;1;49c17;15f1;c2;134c;13b

Barracuda Spam and Spyware Firewall
Reclaim your Network. Stop Spam, Spyware and Viruses at the gateway.
The leading solution.
http://newsletter.industrybrains.com/c?47;2;4126c;1b;c2;134c;13b

Policy Management vs Vulnerability Scanning
Which is right for you? Vulnerability scanning products test for known
vulnerabilities. Policy management products are pro-active by locking
the doors in advance of a possible attack. Click to request our white
paper.
http://newsletter.industrybrains.com/c?47;3;49abe;1af5;c2;134c;13b

Stop Spam at the Mail Server with CanIt-PRO
Roaring Penguin's CanIt-PRO anti-spam solution offers customizable spam
and virus control for enterprises, campuses and ISPs. Designed for the
mail server, CanIt-PRO lets you stop spam on YOUR terms. Click for free
price quote for your organization.
http://newsletter.industrybrains.com/c?47;4;4f283;a0d3;c2;134c;13b

Information Security & Compliance Consulting
Learn more about how expert VeriSign security consultants help
enterprises protect critical data, meet compliance requirements, and
maximize their return on security investments -- fREE "Optimizing
Security Compliance" white paper.
http://newsletter.industrybrains.com/c?47;5;51b4c;acf8;c2;134c;13b

________COMPUTERWORLD SECURITY WATCH________________________

THE SECURITY AGENDA
-------------------

Build a security plan to protect your company's assets. In this
comprehensive report you will learn everything from how to educate
staff against picking easy-to-crack passwords or falling for "social
engineering" attacks to keeping up with the latest patches and fixes
from vendors. This report is a must for security professionals.
https://store.computerworld.com/?source=SEC2_bot

___________CONTACTS/SUBSCRIPTIONS___________________________

FEEDBACK
--------
To submit feedback about Computerworld's e-mails, contact our online
customer service group at online@computerworld.com. Please include the
following subscriber e-mail address in all correspondence:

pet.computter@GMAIL.COM

ADVERTISING
-----------
For information on advertising, contact
Kathy_Snow@computerworld.com

PRIVACY POLICY
--------------
Computerworld's online privacy policy is at:
http://www.computerworld.com/about/policies

SUBSCRIPTION SERVICES
---------------------
This message was broadcast to:

pet.computter@GMAIL.COM

To sign up for Computerworld's e-mail newsletters, stop
getting them or change your e-mail address, go to the following URL:

http://www.cwrld.com/nl/preferences.asp

and LOGIN using the email address shown above.

Copyright 2005 Computerworld Inc.
1 Speen Street
Framingham MA 01701