According to the Anti-Phishing Working Group, one cyber gang known as Avalanche was responsible for two-thirds of all phishing attacks in the second half of 2009.
<b>Database Journal:</b> "Many third parties create rich applications to facilitate database management, database development and database administration. Here are ten outstanding graphical interfaces for MySQL."
<b>LWN.net:</b> "Linux distributions don't simply appear on mirrors and BitTorrent networks fully formed. A great deal of work goes on behind the scenes before a release sees the light of day."
Of the more than two dozen vulnerabilities Microsoft is addressing in April's Patch Tuesday release, the firm's monthly security update, five are deemed critical.
<b>nixCraft:</b> "Ksplice service allows you to skip reboot step and apply hotfixes to kernel without rebooting the server. In this post I will cover a quick installation of Ksplice for RHEL 5.x and try to find out if service is worth every penny."
<b>LXer:</b> "Apart from Apple, some other companies are bringing some interesting tablets. In contrary to the iTab, those other tablets do run Linux. Some are already available, such as the TouchBook from Always Innovating (AI), and some have supposedly better screens, like the Notion Ink Adam tablet."
Security research McAfee warns that bogus messages instructing Facebook members to reset their login information could reach tens of millions of users.
Want to extend your marketing reach more customers than you thought possible for less money than ever before? Author Clara Shih says get into social networking.
<b>Zona-M:</b> "When you start doing it though, you soon find out that the hardest, or at least lest documented task, is not how to send email, or how to block spam. It is how to make sure that the email you send is always accepted by other sites, that is how to find out if your email server looks like a spam source."
<b>Standards Blog:</b> "It does leave open one tantalizing question though, that's harder to read: does the decision to charge for the plug-in indicate that Oracle is taking its ODF-compliant office suite unit seriously as a money maker, and plans to put serious resources behind it..."
<b>Worldlabel:</b> "If you use the open source Mozilla Thunderbird email client, you're probably familiar with its powerful address book features: import and export, online status information for your friends, even synchronization. But one thing that's not so obvious is how to do a mail merge to your address book contacts."
The latest clickjacking scheme on Facebook managed to trick hundreds of thousands of users into "liking" and posting malicious links on their personal pages.
<b>IBM Developerworks:</b> "In this article, learn how to detect which capabilities are present and how to take advantage of those features in your application. Explore powerful HTML 5 features such as multi-threading, geolocation, embedded databases, and embedded video."