Search This Blog

Tuesday, January 20, 2009

Six worst Internet routing attacks; Fake sites spreading malware claim Obama won't take oath

How YouTube, Yahoo and others fell prey to router incidents and accidents
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Alcatel-Lucent
rule

Reduce Risks with SOA Governance
Support scalable SOA governance and meet your compliance requirements. Respected analyst Andreas Antonopoulos from Nemertes Research along with experts from HP and Alcatel-Lucent will explain how in this on-demand Webcast. Watch now.

rule

Spotlight Story
Six worst Internet routing attacks

Carolyn Duffy Marsan By Carolyn Duffy Marsan
Here's our list of the biggest security incidents involving the Internet's core routing protocol, the Border Gateway Protocol. Some of these incidents were attacks; others were accidental misconfigurations. But all of them disrupted traffic to Web sites or entire networks because of incorrect routing messages being propagated across the Internet through BGP. Read full story

Related News:

Fake sites spreading malware claim Obama won't take oath Sites claiming President-Elect Barack Obama will refuse to take the oath of office Tuesday are serving up attack code believed to be programmed by the same hackers responsible for the notorious Storm bot Trojan, researchers said this weekend.

'Amazing' worm attack infects 9 million PCs Calling the scope of the attack "amazing," security researchers at F-Secure Corp. Friday said that 6.5 million Windows PCs have been infected by the "Downadup" worm in the last four days, and that nearly nine million have been compromised in just over two weeks.

Likely insider hack taunts company executives At the same time the Radio Advertising Bureau (RAB) was making a 10% employee layoff yesterday, the association's CEO e-mail was hacked and a hoax lay-off memo sent out that disparaged the organization as sexist and filled with overpaid "good 'ol boys."

Secure Software: 'See No Evil' is Not a Strategy It has been written that data is the new gold, the new oil, the new currency, and even the new crown jewels. It has become very popular to write about, and to capitalize upon, data as the new medium through which commerce is done. Unfortunately, while gold is typically transported in high security vehicles between highly secured facilities, and while no expense is spared in protecting national money supplies from theft and forgery, data is not managed this way, it is handled by software. This is software written twenty years ago for mainframes in sealed rooms, or software written by brilliant but unseen open source programmers to provide low-cost high-grade functionality, or software written by individuals with little formal secure programming training, looking to improve user experience and corporate profitability. Every major organization, enterprise, and government in the world relies on software, and there is virtually no consensus on what it means to have secure software, how to...

U.K. Ministry of Defence stung by rapidly spreading virus The U.K. Ministry of Defence is in the midst of an electronic fight with a computer virus that rapidly spread through its computer networks starting Jan. 6.

Study blasted for downplaying online threats to children A report released Wednesday by a task force set up by MySpace Inc. paints a surprisingly benign picture of the online security and privacy threats faced by children. But the report's conclusion - that some of the ...

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Alcatel-Lucent
rule

Reduce Risks with SOA Governance
Support scalable SOA governance and meet your compliance requirements. Respected analyst Andreas Antonopoulos from Nemertes Research along with experts from HP and Alcatel-Lucent will explain how in this on-demand Webcast. Watch now.

rule

Take Control of Network TCO by Automating IPAM
Join ESG and Infoblox to learn about reducing network TCO while boosting network availability by automating IPAM.
Review this information-packed webinar today.


Successfully Manage a Secure Database.
Database professionals are invited to join this Oracle Live Webcast on Thursday, February 5 at 2:00 p.m. ET/11:00 a.m. PT. Gain a better understanding of database security and how to more strategically work with security administrators. Don't miss out.
Register for this live webcast now.

 

01/20/09

Today's most-read stories:

  1. Microsoft layoffs could come next week
  2. U.S. plots major upgrade to Internet router security
  3. Nortel's bankruptcy: A long time coming
  4. FAQ: What's in store for Nortel
  5. The presidential portrait goes digital
  6. Why Windows 7 will crush Linux
  7. Worm infects 1.1M Windows PCs in 24 hours
  8. Microsoft/Nortel relationship again under microscope
  9. Windows 7 on Netbooks: Does Linux stand a chance?
  10. How Obama might get his way on BlackBerry


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: