Mystery of RealPlayer exploit unfolds; FBI, police warn of Calif. Wildfire fraud

Latest security news.

Mystery of RealPlayer exploit, hijacked ad server unfolds, 10/25/07: A week after Symantec security researchers traced the elaborate course of a malware exploit -- apparently devised in the Netherlands -- to what may be a compromised ad server belonging to Internet advertising company 24/7 Real Media, the attack method isn’t fully understood.

FBI, police community warns of Calif. Wildfire fraud: The FBI, Better Business Bureau and California prosecutors Thursday separately issued warnings concerning potential disaster related fraud schemes in connection with the ongoing Southern California wildfires. Many of these schemes are Internet-based scams representing themselves to be disaster relief charities, the groups said.

Data encryption’s adoption grows, 10/25/07: Large security vendors are buying up encryption start-ups. Venture capitalists are putting money into young companies to spur the development of encryption products. New companies are launching products to help manage and simplify encryption.

Austrian police to use crime-busting Trojans, 10/25/07: The Austrian Police has become the latest European agency to express its intention to use specially-crafted Trojans to remotely monitor criminal suspects.

Security guru notes how IT eases committing fraud, 10/25/07: Fraud expert, author and ex-con artist Frank Abagnale doesn't use online banking, thinks ID cards are a bad idea, and reckons the U.K. needs data breach notification laws.

Security deadline missed by one-third of Visa merchants, 10/25/07: Just over a third of large-volume Visa merchants failed to meet a Sept. 30 deadline to comply with the Payment Card Industry's 12-part Data Security Standard, Visa said yesterday, and those companies are facing fines of $25,000 per month.

With Provilla buy, Trend Micro to offer data leak protection, 10/25/07: Trend Micro plans to buy Provilla, making it the latest major security vendor to enter the crowded data leak prevention market.

What the hackers know about SQL Server Management Studio: Microsoft Subnet welcomes new blogger Chris Amaris, chief technology officer and co-founder of Convergent Computing. Chris is a security, network and systems management guru, and author of many books. He writes: "It is an often overlooked fact that the SQL Server Management Studio is a potential source of exploits itself."

Securing your Cisco router by limiting access lists: Cisco Subnet blogger Raj Tolani walks you through how to secure a router by limiting your VTY access.

Learn more about this topic

 
Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Related:

Copyright © 2007 IDG Communications, Inc.