Search This Blog

Monday, February 23, 2009

Conficker worm gets an evil twin; More than half of booted workers steal data on way out

The criminals behind the widespread Conficker worm have released a new version of the malware
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

A Synergistic Relationship
In today's fast-paced business environment, workers and executives need uninterrupted access to applications and data - anytime and anywhere. The new Dell(TM) Latitude(TM) E Family line of notebooks offers appropriate hardware to complement many Windows Vista features.

rule

Spotlight Story
Conficker worm gets an evil twin

Robert McMillan By Robert McMillan
The criminals behind the widespread Conficker worm have released a new version of the malware that could signal a major shift in the way the worm operates. Read full story

Related News:

More than half of booted workers steal data on way out, survey finds A survey of 945 individuals who were laid off, fired or quit their jobs in the past 12 months shows that 59% admitted to stealing company data and 67% used their former company’s confidential information to leverage a new job.

Microsoft: Online gamers still a top malware target What's the most common type of malware on the Internet? Viruses? Botnet code? How about password-stealing worms, designed to victimize online gamers?

Proposed law might make Wi-Fi users help cops A proposed U.S. law would require Internet service providers to store information about every user of their services and keep that data for at least two years, in a bid to crack down on Internet-based predators and child pornographers.

First Symbian S60 3rd Edition malware spotted: F-Secure The first malware to exploit the Symbian S60 3rd Edition platform has been identified, according to security firm F-Secure, which says the code is a Trojan in the wild that may be used for spam among other purposes.

Skype calls' immunity to police phone tapping threatened Suspicious phone conversations on Skype could be targeted for tapping as part of a pan-European crackdown on what law authorities believe is a massive technical loophole in current wiretapping laws, allowing criminals to communicate without fear of being overheard by the police.

Researcher shows new SSL Web site hack A researcher has found a convincing way to hack the SSL protocol used to secure logins to a range of Web sites, including e-commerce and banking sites.

Novell aquisition bolsters ID governance portfolio Novell has quietly bolstered its ID governance portfolio after acquiring the technology assets of a tiny British company and signing a 'perpetual' licensing deal with California-based ActivIdentity.

Proposed Law Saves Internet User Data In the most recent effort to thwart child predators online, both the U.S. House and Senate are considering bills that would require any Internet access provider -- possibly including public Wi-Fi hotspots -- to retain Internet user data for up to two years.

Adobe flaw heightens risk of encountering malicious PDFs Security companies are warning of a new flaw in two Adobe Systems programs that could compromise a PC merely by opening a malicious PDF file.

Bradford's NAC Director gives pipeline firm more control Mark MacDonald was looking for NAC because he had trouble controlling outside contractors that need to connect to the Enbridge Gas Distribution corporate network in Ontario, Canada.

Hiring levels show one local industry resilient to recession If employee headcount is any indicator, security is one industry which the recession is having no impact on. In fact, according to several vendors in Australia, the need for organisations to stay secure, regardless of the economic climate, is leading to an increase in staff numbers.

BitLocker Extends Its Reach In WS2008 R2, BitLocker can encrypt removeable drives, but that capability comes with a catch, says blogger Glenn Weadock.

JTAG Hacking Cisco Subnet blogger Jimmy Ray Purser explains JTAG, a nifty trick for testing, debugging faulty hardware.

Tagging the native VLAN Cisco Subnet blogger Scott Hogg explains that in Cisco LAN switch environments the native VLAN is typically untagged on 802.1Q trunk ports, which is not the most secure.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


Tweet to compete
Tweet to competeSmart social networking has become essential for most IT execs.

2009 MWC highlights
Top 10 hot spot safety tipsMobile World Congress: Cool gadgets and hot new tech from the world's largest exhibition for the mobile industry.

Sponsored by Dell
rule

A Synergistic Relationship
In today's fast-paced business environment, workers and executives need uninterrupted access to applications and data - anytime and anywhere. The new Dell(TM) Latitude(TM) E Family line of notebooks offers appropriate hardware to complement many Windows Vista features.

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


The Power of LAN Test Tools.
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.

 

02/23/09

Today's most-read stories:

  1. Want to close your LendingTree account? Sorry, no can do
  2. Forget the Oscars: Sit back for the 404 Awards
  3. Security researcher Kaminsky pushes DNS patching
  4. HP cuts pay, benefits after poor financials
  5. Conflicker worm gets an evil twin
  6. Stimulus bill aims for 'national broadband plan'
  7. The ultimate browser security face-off
  8. Kanye West designed X-rated Mario-like video game
  9. 9 dirty tricks: Social engineers' favorite pick-up lines
  10. JTAG Hacking


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



1 comment:

coffee maker said...

how in the world would such a ridiculous worm get in my system in the first place, i wonder?