Thursday, January 29, 2009

Downadup's calm before the storm; Click fraud shoots up in Q4, driven by botnets

Downadup worm may be unleashed at a later date with an even greater vengeance
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Spotlight Story
Downadup's calm before the storm

By Kathleen Lau
The Downadup worm may have already created havoc with the estimated nine million PCs it's infected, but one security expert warns the worm is only dormant, perhaps to be unleashed at a later date with an even greater vengeance. Read full story

Related News:

Click fraud shoots up in Q4, driven by botnets Click fraud, a big threat to the highly profitable pay-per-click search advertising business, increased significantly in the fourth quarter, thanks to scammers' rising and sophisticated use of botnets.

Security networks send spammers underground Botnets will employ more obfuscated control techniques including the use of peer-to-peer networks during 2009, according to security researchers, following the McColo data center take-down last year.

What the Web knows about you She had me at hello ... or just about. Our conversation had barely started when privacy activist Betty Ostergren interrupted me to say that she had found my full name, address, Social Security number and a digital image of my signature on the Web.

Searching for the digital needle in a relational hackstack Let me share a few of the tools I use to help customers identify their possible exposure to information theft.

Coming soon: Full-disk encryption for all computer drives The world's six largest computer drive makers Tuesday published the final specifications for a single, full-disk encryption standard that can be used across all hard disk drives, solid state drives (SSD) and encryption key management applications. Once enabled, any disk that uses the specification will be locked without a password -- and the password will be needed even before a computer boots.

VA to pay $20M to settle data theft case The Department of Veterans Affairs has agreed to pay $20 million to military personnel to settle one of the government's most high profile and embarrassing data theft cases. The VA data theft in 2006, involved the theft of a laptop from an employee's home that contained the unencrypted personal records of 26.5 million military veterans and their spouses. The breech lead to several new laws concerning how the government and public companies are to treat such breeches. The laptop was ultimately recovered and the VA maintains that no personal data was ever compromised.

5 Musts for Advancing Video Surveillance in Security Video surveillance was once the exclusive province of physical security; operators looked at multiple video screens, each displaying the field of view of a single video camera, to monitor for security incidents. But increasingly, the charge of fully securing an organization's assets requires a larger number of cameras with multiple viewers of the video information.

Banks, credit unions scramble in wake of Heartland breach In the first real indication of the scope of the recently disclosed breach at Heartland Payment Systems, banks and credit unions from Washington to Maine have begun to reissue thousands of credit and debit cards over the past few days.

Obama to tap Symantec CEO Thompson for commerce secretary? A big fundraiser for President Barack Obama, Symantec CEO John Thompson is in the running for U.S. Secretary of Commerce, according to published reports.

MySpace faces fresh controversy over sex offender issue Just two weeks after a task force whose formation was spearheaded by MySpace delivered a report saying that social networking sites were safer from sexual predators than many people had assumed, MySpace finds itself dealing with a new inquiry related to registered sex offenders by Connecticut's attorney general.

Undercover theft retrieval software gets location tracking Orbicule has announced Undercover 3, a major new release of its theft-recovery software for Mac OS X. It costs $49.

Who goes there? Identity management is all about who you are and what you should be allowed to do. This Product Guide describes the technology and how it works.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by Oracle
rule

Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out. Register for this live webcast now

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/29/09

Today's most-read stories:

  1. Online privacy tips for teens . . . and the adults who ignore them
  2. FTC slaps Do Not Call violators with $1.2 million in penalties
  3. Fallout 3: Operation Anchorage DLC now available
  4. Cisco sets data center blast
  5. HP readies for Cisco's data center assault
  6. New Data Center: storage
  7. Cisco delivers security, storage, UC for small business
  8. Downadup/Conflicker worm: When will the next shoe fall?
  9. Cisco acquires building systems specialist
  10. New botnet resurrects Storm's Valentine's Day ruse


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment