yup..can't argue with that.. both of this group are different in every subject that focus on :)
On Fri, Apr 23, 2010 at 12:03 AM, BRIAN RITCHIE <[email protected]>wrote: > Najmi, > > Just a thought on the subject again. While I am a very big fan of your > emails, and in fact look forward to receiving them due to the fact that I > hardly get the time to surf my RSS feeds for updates, I feel there is a need > to differentiate the content you send to both OWASP and MySec. > > OWASP = Web Application Security related items > > MySec = Everything within the realm of Security. > > I am a big fan of unity among groups and in fact preach it alot. I hate > differentiation but unfortunately for OWASP and MySec, the situation is > different. Think of OWASP's domain as a subset of MySec, meaning it only > gathers part of what you choose to share with MySec and only should look at > Web Application related content. I am forced to bring this up because OWASP > is an open group with working professionals both from Gov and Private as > well and I am concerned that they might raise the question of why they are > getting unrelated content. > > I'd like your thoughts on this as well as other members. If all of you > are ok with non Web Application related content sent to the OWASP list, then > I am more than happy. Just concerned with the backlash Najmi. Hope you > understand. :-) > > -BRIAN RITCHIE > > On Thu, Apr 22, 2010 at 11:08 PM, Muhammad Najmi Ahmad Zabidi < > [email protected]> wrote: > >> >> >> ---------- Forwarded message ---------- >> From: Microsoft Malaysia <[email protected]> >> Date: Thu, Apr 22, 2010 at 10:14 AM >> Subject: Malware, SPAM and Phishing >> To: [email protected] >> >> >> If you are unable to view this HTML eDM, please click >> here<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f29e60a2e9d220a4006165bcc1617b310d09e51fd3d666a414342dcfee1d81d262> >> [image: >> Malware, Email Threats and Phishing - Still a Threat and Getting More >> Sophisticated in Nature!] >> >> In this edition of the Microsoft Security Intelligence Report Series – >> Part 3, we will be looking at malicious and potentially unwanted software. >> Specifically malware, email threats and phishing attacks. >> Malicious and Potentially Unwanted Software >> Infection data from several Microsoft security products demonstrates the >> highly localised nature of malware and potentially unwanted software. >> >> In the United States and United Kingdom, Miscellaneous Trojans account for >> the largest single category of threat with families such as Win32/Alureon >> and Win32/Vundo common in both locations. >> >> The top threat in France and Italy by a wide margin was the Miscellaneous >> Trojans family Win32/Wintrim. >> >> In China, many of the most prevalent families are Chinese-language threats >> such as the browser modifier Win32/BaiduSobar or password stealers that >> target players of online games, including Win32/Lolyda and Win32/Frethog. >> >> Brazil is dominated by Portuguese-language password stealers that target >> online users of Brazilian banks, led by Win32/Bancos. >> >> Spain and Korea are both dominated by worms, led by Win32/Taterf which >> targets players of online games. The prevalence of Taterf in Korea may be >> due in part to the worm’s propensity to spread easily in Internet cafés and >> LAN gaming centres. >> >> While security software is evolving, so is the sophistication of attacks. >> Customers therefore need to ensure they build a defence-in-depth approach to >> security and combine technology to ensure the greatest protection. >> *Microsoft® >> Windows® 7 and Windows® Server >> R2<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2f22873822ec887b95376eef14528613d179747ad051bc7fe2fab5fc10ef56a65> >> * together deliver security that extends beyond the desktop. >> >> *Malicious And Potentially Unwanted Software - Geographic trends by >> system "location" setting* >> Threat categories worldwide and in eight locations around the world, by >> incidence among all computers cleaned, 1H09 >> >> E-mail Threats >> The vast majority of e-mail messages received via the Internet are >> unwanted. Not only does this tax the recipients’ inboxes and the resources >> of e-mail providers, it also creates an environment in which e-mailed >> malware attacks and phishing attempts can proliferate. Blocking spam, >> phishing, and other e-mail threats is a top priority for e-mail providers, >> social networks, and other online communities. >> >> Here is a snapshot of some facts on email threats around the world in >> 1H09: >> >> - Forefront Online Protect for Exchange (FOPE) blocked 97.3% of all >> unwanted messages at the network edge >> - The dominant form of spam in 1H09 was product advertisements >> - Most spam was sent through botnets or other automated tools >> >> Using technology like *Microsoft® Forefront for Exchange and >> SharePoint<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2af29925f920e53e40c97ef7b0584fcafa54433cc9017a1e0b8637d04bdb3b57e> >> * reduces SPAM entering an organisation’s perimeter and from being >> circulated further through email and collaboration servers. >> Phishing >> Legitimate websites belonging to innocent parties that have been >> compromised are often used by attackers to host phishing pages or distribute >> malware. In many cases, just visiting these sites can be dangerous, since >> attackers often create exploits that can silently download malware to >> vulnerable computers as soon as the user loads the page. Installing *Security >> Updates<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2a00816b67182013d3a99dbbb42cd70955cff23dd9c2d522c5622c5e6bb5106d9> >> * for the operating system, the browser, and any installed browser >> add-ons in a timely manner can greatly reduce users’ chances of being >> victimised. >> >> Microsoft maintains a database of known active phishing sites reported by >> users of Internet Explorer and other Microsoft products and services. When a >> user attempts to visit a site in the database with *SmartScreen >> Filter<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2488d15e128b074ba410b528c8f7d60496ca71e5d6058c89e015c5c4f66cc24be> >> * in Microsoft® Internet Explorer 8 enabled, Internet Explorer checks the >> URL against the database. If the site has been reported as a phishing site, >> Internet Explorer blocks navigation to the site and displays a warning. >> Microsoft monitors traffic to the reported phishing URLs and uses the >> information to improve its filtering technology and its efforts to track >> suspected phishing sites. >> >> *Malicious Web Sites - Analysis of phishing sites* >> Unique attempts at Phishing blocked by smart screen filter in Internet >> Explorer 8 >> Phishing impressions tracked each month in 2H08 and 1H09, indexed to >> January 2009 >> >> After remaining mostly consistent throughout 2H08 and through April 2009, >> the number of impressions suddenly almost quadrupled in May and rose even >> higher in June. However, the number of actual phishing sites decreased, with >> analysis showing social networking sites the target of 76% of phishing >> attacks in 1H09. >> >> *Malicious Web Sites - Target institutions* >> Impressions for each type of phishing site each month in 1H09 >> >> To find out more about malware, email threats and phishing, *read >> the >> report<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f219ca985ad5b819b6a118eea43cdf8533be3e06dbeebfcdad961c856fc7dc2160> >> * on our site. And do remember to look out for the final part of our >> Security Series, Part 4, where we’ll provide some valuable recommendations >> on how to keep your *computers, data and your enterprise safe*. >> Unsubscribe<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f24cec7f4d564729154473bd98f7d392bfee674daf87c5a39920c77e5416051b96>| >> Update >> your >> profile<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f24cec7f4d564729154473bd98f7d392bfee674daf87c5a39920c77e5416051b96> >> © 2010 Microsoft Corporation Terms of >> Use<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2b16d5a314abf791d0be0a2bd102e60f2a4162da62efbf4d391875e2d54cb86fd>| >> Trademarks<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f2f6bf09c1705ff6099723e7b0829330beb5a8c86565f2453968ab5847f6d2f8a8>| >> Privacy >> Statement<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f274643788b3164e97dd5199f22319419b050a7cdb99492b643c9c84daaf8bef39> >> [image: >> Microsoft] >> >> Update >> Profile<http://click.email.microsoftemail.com/?qs=f808f27e3dd520f237344e7acf647126f973d3d8a9bc5ddb675d3ee14c5557545cb7747ffd014482> >> >> -- >> You received this message because you are subscribed to the Google Groups >> "MySecurity" group. >> To post to this group, send email to [email protected]. >> To unsubscribe from this group, send email to >> [email protected]<mysecurity%[email protected]> >> . >> For more options, visit this group at >> http://groups.google.com/group/mysecurity?hl=en. >> > > > _______________________________________________ > Owasp-Malaysia mailing list > [email protected] > https://lists.owasp.org/mailman/listinfo/owasp-malaysia > > OWASP Malaysia Wiki > http://www.owasp.org/index.php/Malaysia > > OWASP Malaysia Wiki Facebook > http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420 > -- Muhd Syazwan @ jipang_menjerit http://blog.ubuntuseekers.com http://blog.syazwan.info [email protected] [email protected]
_______________________________________________ Owasp-Malaysia mailing list [email protected] https://lists.owasp.org/mailman/listinfo/owasp-malaysia OWASP Malaysia Wiki http://www.owasp.org/index.php/Malaysia OWASP Malaysia Wiki Facebook http://www.facebook.com/pages/OWASP-Malaysia-Local-Chapter/295989208420

