Search This Blog

Monday, March 23, 2009

$10,800 per day for cybercrime jockeys?; Power grid is found susceptible to cyberattack

'Obbama' typo helped drive Web traffic into criminals' arms
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by HP
rule

HP Managing network change across your enterprise
Get the facts on the HP Network Automation architecture that intelligently uses network bandwidth and adheres to company security policies and best practices without creating security violations or affecting your production environment. Learn more today.

rule

Spotlight Story
Ukrainian cybercriminals raked in $10K/day, Finjan reports

Ellen Messmer By Ellen Messmer
Ten thousand eight hundred dollars per day for cybercrime jockeys? That's what security vendor Finjan says it witnessed during its 16-day infiltration of a cybercrime operation that involved selling bogus antivirus software. Read full story

Related News:

Power grid is found susceptible to cyberattack An emerging network of intelligent power switches, called the Smart Grid, could be taken down by a cyberattack, according to researchers with IOActive, a Seattle security consultancy.

Researchers make wormy Twitter attack Computer security researchers have devised a new Twitter attack that they say could spread virally, much like a worm on the microblogging service.

A search is launched for Conficker's first victim Where did the Conficker worm come from? Researchers at the University of Michigan are trying to find out, using a vast network of Internet sensors to track down the so-called "patient zero" of an outbreak that has infected more than 10 million computers to date.

ANSI Panel to Standardize Identity Theft Tracking Know the difference between 'identity theft' and 'identity fraud'? Don't feel bad if you don't. Even within the security industry, within the government, and within law enforcement, the terms are used interchangeably although they are in fact different.

Report links Russian intelligence to cyber attacks A follow-up report authored by a group of cyber-security experts claims that Russian intelligence agencies were probably involved in the 2008 cyber attacks on Georgia.

A hacking tool gets updated for the Mac Two well-known Mac hackers are updating a widely used hacking toolkit, making it easier to take control of a Macintosh computer.

Crooks Flock to Rogue Antivirus Apps Chasing massive profits, crooks have unleased a flood of rogue antivirus programs that attempt to fool or scare unsuspecting PC users into forking over cash for an app that does nothing worthwhile.

BBC says U.K. credit card information for sale in India Reporters from the BBC posing as fraudsters claim they bought names, addresses and valid credit card details of U.K. residents from a man the BBC identified as Saurabh Sachar in Delhi.

China closes audiobook porn site in crackdown Chinese police closed a Web site that sold erotic audiobooks and arrested four people involved as the country continued its crackdown on Internet porn, state-run media said Friday.

Security management: 3 key considerations What should you ask when buying security information management software?

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Exchange alternatives: Pros & cons
Clear Choice Test: Microsoft Exchange alternativesTesting shows Microsoft's Exchange still tops for features and management hooks.

App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

Sponsored by HP
rule

HP Managing network change across your enterprise
Get the facts on the HP Network Automation architecture that intelligently uses network bandwidth and adheres to company security policies and best practices without creating security violations or affecting your production environment. Learn more today.

rule

Case Study: Successful LAN Support
Successfully deploy a wired/wireless Ethernet network and keep it running with exceptional up-time. Ensure your network is ready for new technologies by running assessment tests that provide you with the data you need. Resolve connectivity issues and quickly address network performance complaints. Get all of the details today.
Download this whitepaper now.


What you need to see all 7 layers
Get all the tools you need to see all 7 layers of your network. Fluke's OptiView Analyzer combines protocol analysis, active discovery, and device and traffic analysis in a mobile solution, giving you the information you need to control your network and minimize disruption.
Click here for your free trial.

 

03/23/09

Today's most-read stories:

  1. Rootkit to exploit Intel chip flaw to be posted 3/19/09
  2. Voluntary separation scheme for Dell's Malaysian staff
  3. Researcher cracks Mac in 10 seconds at PWN20WN
  4. Palm revenues plunge as Pre's launch draws near
  5. Tweeted out of a job: "Cisco Fatty" story
  6. Cisco buying flip video camera maker for $590 million
  7. Developer accidentally triggers iPhone tethering in 3.0 beta
  8. Cisco rivals size up UCS with usual reaction: caveat emptor
  9. Can Cisco sell 'unified' vision to a tough server crowd?
  10. IBM + Sun: How a merger would impact IT
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: