In This Issue:
1. Editor's Note: The Return of Spam
2. Today's Top Story
- iPod Dominated Holiday Shopping Season, Web Researcher Says
- Netflix, Amazon Take Top Honors In Holiday Season Shopping Experience Survey
3. Breaking News
- Chinese Hackers Launch New Office Attack
- Asian Net Access Improves Slightly After Quake
- Samsung's 1-Gbyte DRAM Chip To Appear In Portable Devices Next Year
- Phishers' Latest Platforms: VoIP, SMS
- Apple Falls 6% On Concerns About Options Probe
- 2006 Declared Year Of The Zombies
- Poll Shows Strong Job Market In 2007
- Chess Player Banned 10 Years For Cheating With Bluetooth, Computer
- U.S. Judges Approve $2.45 Billion Nortel Settlement In Accounting Scandals
4. In Depth
- Apple Quietly Fixes iPod Shuffle No-Play Problem
- Microsoft Zune Fails To Reach Top Seller Lists On Amazon.com
- Planned Home PC Purchases Surge, Apple Closes On HP
5. Voice Of Authority
- Christmas Is A Time For...Virtual Machines?
6. White Papers
- Customers As Assets
7. Get More Out Of InformationWeek
8. Manage Your Newsletter Subscription
Quote of the day:
"An object in possession seldom retains the same charm that it had in pursuit." -- Pliny the Younger
1. Editor's Note: The Return Of Spam
In recent weeks, you've probably noticed the return of an old pest: spam. For almost two years, it seemed as if spam might finally be on the decline. Remember when Bill Gates said that by 2006, "spam will be solved"? Well, that was all going well until a few months ago when spam struck back.
According to e-mail filtering vendor Postini, spam volumes have grown 73% in the last two months. There are several recent developments that have triggered the new growth of spam:
Spammers are now embedding their messages in images to slip past spam filters that search for keywords and phrases. The number of e-mails with images has grown from nearly zero to almost 25%.
Spammers are experimenting with the text in their messages, especially in the subject lines. All it takes is a few minor tweaks and a spammer can successfully go from the spam filter to the in-box.
There are others as well. What does this all mean for you? Please weigh in at my blog entry.
Phishers' Latest Platforms: VoIP, SMS
Symantec also has accumulated evidence that shows some phishers are collecting user names and passwords fast enough to defeat two-factor authentication number generators and are using one-time, quickly disposed URLs to avoid site blacklisting, a common anti-phishing technique.
Apple Falls 6% On Concerns About Options Probe
The report, from legal trade publication The Recorder on the Web site Law.com, also said chief executive Steve Jobs has hired his own attorney to deal with inquiries by the Securities and Exchange Commission and the Department of Justice into Apple's stock option grants.
Learn how your peers are protecting customer data and managing privacy issues in the InformationWeek/Accenture Global Information Security Survey of more than 2,000 technology and security professionals.
Satisfaction With Outsourcers
How does your outsourcer stack up? Learn how more than 400 business technology professionals rated six of the leading outsourcers in InformationWeek Research's Analyzing The Outsourcers: Global Services report.
5. Voice Of Authority: Christmas Is A Time For...Virtual Machines?
And A New VM For Mom
Christmas is the time for giving, and for many people this means technology. It's certainly no different in my familyDad got a new Gigabit Ethernet rig, my little brother got some games, and my niece got a portable DVD player. Mom? She got a new VM.
6. White Papers: Customers As Assets
The Customer As A Strategic Asset
In this white paper, we discuss some of the initiatives that Fortune 1,000 companies are undertaking, discuss some of the gainsand lossesthat can result from each, and analyze the emerging trend toward considering the customer as the ultimate strategic assetthe final watershed that will divide the winners and losers in global business.
Note: To change your E-mail address, please subscribe your new address and unsubscribe your old one.
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. Thanks.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.