Microsoft will debut next month a major overhaul of its Hotmail webmail service, with upgrades across the board, including in areas like spam, security and performance.
“We listened. We learned. We reinvented Hotmail from the ground up,” reads an invitation sent on Friday to journalists for press events to be held on Oct. 3 simultaneously in New York and San Francisco.
“Forget everything you thought you knew about Hotmail. Just don’t forget this date,” reads the invitation.
Hotmail’s primary competitors are Google’s Gmail and Yahoo Mail. The last time the consumer webmail market got a product jolt was in 2004, when Google surprised the world with Gmail and its then-unprecedented amount of email storage.
At that point, innovation in webmail services had stagnated for years but Gmail shook Microsoft, Yahoo and other webmail providers like AOL out of their comfort zone, as they quickly responded by increasing the size of their email inboxes.
Read More…
Tags: AOL, applications, conversation threading, data, downloads, email client, email exchanges, email storage, emailing, enhancements, Gmail, Google, Hotmail, internet, invitation, journalists, mailbox consoliation, mailboxes, Microsoft, New York, Online, original messages, performance, press conference, products, providers, re-design, replies, San Francisco, search functionality, Security, Spam, Storage, technology, web, Web Mail, Yahoo, Yahoo Mail
Spam – particularly the kind with malicious attachments – is enjoying a growth spurt, reaching a two-year high overall, which includes the spike last fall just before the SpamIt operation folded its doors, a security firm says.
In fact spam traffic is about double what it was then, according to M86 Security Labs, which analyzes spam levels across selected domains.
“After multiple recent botnet takedowns, cybercriminal groups remain resilient clearly looking to build their botnets and distribute more fake AV in the process,” the company says in its blog. “It seems spammers have returned from a holiday break and are enthusiastically back to work.”
This report coincides with a report yesterday from Internet security company Commtouch, which says a spike in email-attached malware has just ended, but that further waves are expected.
M86 says in its blog that most of the spam is generated by the Cutwail botnet, and malicious spam accounted for 13% of the mix over the past week, which is unusually high, but even that spiked to 24% yesterday.
Read More…
Tags: antivirus, Asprox botnet, blogging, botnet, botnet takedowns, Commtouch, computer crimes, Computers, Cutwail botnet, cybercrimes, cybercriminals, dating sites, domains, downloads, email-attached, emails, fake AV, Festi, gambling sites, holiday break, hotel transactions, internet, internet security, labs, M86 Security Labs, malicious attachments, malicious spam, malware, Online, password-stealing, pharmaceticals, phishing scams, phony antivirus, phony correspondence, report, SCAMs, Security, Spam, Spamit, Spammers, subjects, technology, trojan horses, UPS, web, websites
Microsoft today patched a whopping 64 vulnerabilities in Windows, Office, Internet Explorer (IE), and other software, including 30 bugs in the Windows kernel device driver and one in IE that was exploited at the Pwn2Own hacking contest last month.
The company also delivered a long-discussed “backport” to Office 2003 and Office 2007 that brings one of the newer security features in Office 2010 to the older editions.
The 17 updates, which Microsoft dubs “bulletins,” tied a record set late last year, but easily beat the October 2010 mark for the total number of flaws they fixed. Altogether, today’s updates patched 64 vulnerabilities, 15 more than in October and 24 more than in the former second-place collection of December 2010.
Nine of the 17 bulletins were pegged “critical,” Microsoft’s highest threat ranking, while the remainder were marked “important,” the next-most-serious label.
Microsoft and virtually every security expert pegged several updates that users should download and install immediately.
“There are three we think are top priorities,” said Jerry Bryant, group manager with the Microsoft Security Response Center (MSRC), in an interview earlier today. Bryant tagged MS11-018, MS11-019 and MS11-020 as the ASAP updates.
Read More…
Tags: backport, browsers, Bugs, bulletins, Computers, Computing, contest, Cornflickr, critical patches, device drivers, devices, downloads, Drivers, exploits, Hackers, hardware, IE, IE8, IE9, infections, installation, internet, Internet Explorer, Irish, Kernel, Microsoft, Microsoft Security Response Center, MS11-018, MS11-019, MSRC, Notebook, Office 2003, Office 2007 Windows Office, older editions, patches, PC's, phishing, Pwn2Own, researchers, Security, security features, security patches, security updates, security vulnerabilities, services, Software, Spam, targeted attacks, technology, updates, viruses, web, Windows, Windows Server Update Services, worm
It is being reported that hackers have been able to exploit holes in Windows and Microsoft new of the issue since January of 2011.
The exploit deals with the Windows protocol handler in Windows for MHTML. Be advised the exploit can only be done if the user is running Internet Explorer. Apparently, hackers are using cross-site scripting attacks are intercepting and collecting peoples information, spoofing the content that is displayed to the browser, or interfering with the user’s browsing activities. Read More….
Tags: 4Chan, account numbers, address, advantages of using a consultant, anti-virus, applications, attacks, backdoor, best Internet Phone Service, beta, Blog site, Brooklyn, browsers, bug, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, code, commands, computer, computer consultant, Computer Consultants, Computer Help Desk, Computer Install, computer network services, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, cross-site scripting, CSS, data, data centers, DEP, Desktop Services, download, Email, email services, FedComp, format, Gawker sites Hacked, Hackers, hacking, Help Desk Services, hosted exchange, IE, IE6, IE7, IE8, internet, Internet Explorer, Internet Explorer security issues, IT Audits, IT Outsourcing, IT support services, Laptop, link, linksys routers, machine, malware, managed IT services, MHTML, Microsoft, Network Design, network management, Network Optimization, Network routers, Network Services, network solutions, network support services, networks, online data backup, payments, PC repairs, PC's, processor, production servers, prosecution, Routers, Security Issues Windows, sell, Server Management, servers, site, Software, Spam, Symantec, systems, technical support, Telcom Audits, telephone auditing review, test computers, test system, The Syber Group, US Secret Service, Virtual Computers, Virtual Machine, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, website, Windows, Windows Technician, Wireless Internet
We found out Bloggers using the WordPress platform was shutdown by a DDos attack yesterday that apparently affected many blog sites.
The DDos hostilities began in the morning and lasted for a couple of hours. The estimates on the DDos attack was thought to be “multiple Gigabits per second and tens of millions of packets per second”, according to sources, WordPress is working with their providers to prevent such acts from ever taking place again.WordPress the attack is over, though in Chicago, Dallas and San Antonio. The good news is that the site is back up. However, while the attack was in progress sources say it was on of the “largest” the organization has ever seen. Even centersThe attack unfortunately hit main three data. Read More…..
Tags: 60606, Adobe, advantages of using a consultant, android, Android applications, apple, apps, attacks, best Internet Phone Service, Blog sites, Bloggers, blogs, botnet, botnets, bots, cellphones, Cellular, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, control, crime, crimes, criminals, cybercrime, cybercrimes, cybercriminals, Darkness Botnet, data centers, DDoS, DDos Attack, Defender, devices, domains, DOS Attacks, email services, emails, Essentials, flash, games, Google, hack attack, Hackers, Hackers Attack WordPress with DDOS, hacking, Help Desk Services, hi-tech, infections, internet, internet tv, internet-enabled, investment accounts, IP addresses, ipad, iPhone, IT Audits, IT Outsourcing, linksys routers, malicious code, malware, MCAfee, Microsoft, mobile devices, Network routers, news, Nokia, Non English Blog sites, Non English Bloggers, Operating System, OS, patches, PC repairs, PC's, PDF, PDF documents, phishing, politically motivated hacking, research, Routers, Russia, Security, Security Analyst, security software, security threats, smart phones, smartphone software, smartphones, Software Agents, Spam, spamware, tablets, Telcom Audits, telephone auditing review, The Syber Group, transfer malware, trojan horses, USA, Virtual Computers, Virtualization, viruses, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, web-based threas, websites, Wikileaks, Windows, Windows Technician, Wireless Internet, Wordpress, WordPress Shut down for two hours, Zeus, Zeus Botnet, Zeus Trojan, Zombie Computers
As if we don’t have enough to worry about when it comes to potential attacks of all kinds. First there were reports about the social media site Facebook and its highly infected news feeds now there appears to be yet another mischief seeking internet fiend sending out infected Goo.gl links via Twitter. Users are being warned not to click these suspicious links as they might direct you to malicious sites.
Read More….
Tags: 60606, advantages of using a consultant, attacks, best Internet Phone Service, blogs, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, click, cloud computing, Cloud Computing Chicago, comments, Computer Consultants, Computer Help Desk, Computer Install, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, configurations, data, data centers, direct, email services, Facebook, feeds, followers, furniture, goo.gl, Help Desk Services, infected, internet, IT Audits, IT Outsourcing, links, linksys routers, malware, Network routers, Next Web, PC repairs, postings, R7f68, Routers, scripts, sites, social media, Spam, Telcom Audits, telephone auditing review, The Syber Group, tracking, tweets, Twitter, unfollow, updates, users, Virtual Computers, Virtualization, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, Windows Technician, Wireless Internet
Mobile phone security threats rose sharply last year as the growing popularity of Internet-enabled mobile devices like smartphones and tablets provided new opportunities for cybercriminals, security software maker McAfee said.
In its fourth-quarter threat report, released on today, McAfee said the number of pieces of new cellphone malware it found in 2010 rose 46 percent over 2009’s level.
“As more users access the Internet from an ever-expanding pool of devices -computer, tablet, smartphone or Internet TV- web-based threats will continue to grow in size and sophistication,” it said.
McAfee, which is being acquired by Intel for $7.68 billion, said it expected PDF and Flash maker Adobe to remain a favorite of cybercriminals this year, after it surpassed Microsoft in popularity as a target in 2010.
It attributed the trend to Adobe’s greater popularity in mobile devices and non-Microsoft environments, coupled with the ongoing widespread use of PDF document files to transfer malware. Read More….
Tags: Adobe, android, Android applications, apple, apps, botnets, cellphones, Cellular, Computer Consulting 60606, Computer Technician, Computers, cybercriminals, devices, flash, games, Google, hacking, Help Desk Support Chicago, High Speed Internet, High Speed Internet Chicago, internet, internet tv, internet-enabled, ipad, iPhone, IT Outsourcing, IT Outsourcing Chicago, malware, MCAfee, Microsoft, mobile devices, Network Support, Nokia, Operating System, OS, PC, PC Technician, PC Technician Chicago, PDF, PDF documents, politically motivated hacking, Security, security threats, smart phones, smartphone software, smartphones, Spam, spamware, tablets, transfer malware, trojan horses, viruses, VPN, web, web-based threas, websites, Wikileaks
« Previous Page