Two years ago, employment experts advised enterprises that to attract sought-after <a href="http://www.networkworld.com/news/2007/082907-security-standard-5.html">young workers</a> they must exploit new technologies and relax corporate rules. Today those same experts are now coaching young job-seekers to compete with more experienced applicants by becoming more, well, corporate.
Stories by Cara Garretson
In 2008, investments in start-ups that target consumers are expected to remain significantly hotter than those in companies building enterprise wares, as has been the case for the last few years. However, there are a few areas in corporate IT that should see some significant interest, according to Paul Maeder, founding partner with venture capital firm Highland Capital Partners.
A father-son team that has dedicated time and energy to fighting spam says that as of today, it has shut down more than 50,000 Web sites that use unwanted messages to lure traffic.
A new spam campaign has emerged that tells stories of the hard-knock life, and then asks for money.
US Congressman Ron Paul is hot. Image spam is not.
EBay and PayPal, once the primary lures used by phishers to trick e-mail users into giving up personal information, aren't as popular as they used to be.
Carnegie Mellon University is researching the best ways to educate email users about the dangers of phishing, such as how to distinguish the URL of a fraudulent website from a legitimate one. Not exactly rocket science...or is it?
There is a lot of debate about what Storm actually is. Cara Garretson answers this and a couple of other frequently asked questions.
August was a busy month for spammers, with junk e-mail levels reaching nearly 70 percent of all messages sent -- despite the quick decline of a new type of spam.
It appears that PDF spam has had its 15 minutes of fame.
In the month of August to date, there have been 38 malicious-code attacks on instant-messaging networks, double the number experienced in July.
Account confirmation spam is the latest spammer trick, asking recipients to confirm their account information with a bogus organization by logging into a Web site that is infected with the Storm Trojan malware. This latest technique is catching on: Account confirmation spam has grown in volume from 18 percent of all spam on Tuesday to 35 percent Wednesday.
Some early users of Yoomba's new e-mail calling and chat service are complaining that the service spams their e-mail contact lists.
Apparently enough people are buying iPhones online that cybercriminals want in on the action.
Security vendors and users agree that image spam is finally on the decline, but at the same time a new kind of spam is emerging that uses an attached PDF file to trick recipients into buying stock in a company.
- Technical Analyst, Cybercrime Operations ACT
- Voice Engineer ACT
- Technical Analyst, Cybercrime Operations VIC
- Project Manager QLD
- Digital Project Manager VIC
- IT Project Scheduler NSW
- Network Specialist NSW
- Wintel Engineer - Brisbane VIC
- Junior Security Analyst NSW
- Information Security and Risk Analyst NSW
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.