Search This Blog

Monday, March 09, 2009

Symantec identifies third, more aggressive Downadup/Conficker variant; Hunting down bots

Downadup variant is better at defending itself from anti-malware technologies
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Dell
rule

Safe and Secure Hardware Asset Recovery
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.

rule

Spotlight Story
Symantec identifies third, more aggressive Downadup/Conficker variant

Ellen Messmer By Ellen Messmer
A third version of Downadup, also called Conficker, has been identified, and Symantec says it's better at defending itself from anti-malware tactics. Read full story

Related News:

Hunting down bots on your network "Bots are really tough to keep track off. Their Achilles heel has always been their bi-directional communication with a command and control server somewhere. I am a big believer in mining and correlating your current data to find answers on your network. With that in mind, I have been running the program Bot Hunter for a while now...a free program for tracking bots on your network that uses the Snort 2 correlation engine," Jimmy Ray Purser writes in his Networking Geek to Geek blog.

Cisco releases patch to fix DoS vulnerability in 7600 routers Cisco on Wednesday released a patch that fixes a denial of service (DoS) vulnerability in the Cisco Session Border Controller (SBC) for the Cisco 7600 series routers. In addition to the patch, Cisco has published workarounds that mitigate the problem. All Cisco ACE-based SBC modules running software versions prior to 3.0(2) are affected. However, the Cisco XR 12000 Series SBC is not vulnerable.

Job 1 for New Federal CIO: Balance Openness with Security President Barack Obama has repeatedly pledged to make the federal government more open, transparent and accountable to American citizens. After assuming office on January 19, 2009, he immediately took steps to act on his promise, which included issuing new, more open guidelines for the Freedom of Information Act, and more recently, ordering an overhaul of the federal government's contracting system.

Security needs to be 'baked in' say experts A panel of security experts agreed that security needs to thought of a lot earlier in the software development lifecycle, and that the IT industry needs to start shipping "hardened" products, especially with the advent of the cloud and visualisation making the location of sensitive data even more difficult to locate.

Users gain options for mobile voice encryption U.S. President Barack Obama's dilemma over the security of his BlackBerry has given rise to an increased interested in systems that can scramble voice calls to avoid interception.

Take the complexity out of firewall configuration changes As network security infrastructure grows larger and more complex, the likelihood of omissions and misconfigurations that can lead to data breaches and other serious problems is a growing concern. Tufin Technologies has solutions for security lifecycle management that take the human judgment factor out of firewall and router configuration changes. Read about the tools that reduce the risk level that's inherent in security configuration changes.

European push for more online rights to privacy Members of the European Parliament (MEPs) will push for a re-think of the balance between the need for security and the right to privacy on the Internet, not just in Europe but around the world, they agreed during a debate at the Parliament on Thursday.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader. Deadline for entry is March 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Dell
rule

Safe and Secure Hardware Asset Recovery
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.

rule

Webcast: Data center server selection.
Forrester Research's Brad Day helps IT professionals refine their server selection criteria in this informative Webcast, "Beyond Systems Performance." Ensure you will make the right decision for your next-generation data center. Get Day's tips on creating a cost-efficient environment that delivers the performance and long-term resiliency you require.
Watch this Webcast now.


A Simplified Data Center - Live March 12
Contain costs and improve efficiency and reliability by simplifying your data center architecture. On March 12, data center design and implementation experts share in-depth advice on new approaches and examples of deployments - including price, performance and savings.
Register today for this Live Webcast.

 

03/09/09

Today's most-read stories:

  1. Bathrooms become smarter with touch screens
  2. Vivek Kundra named America's CIO
  3. Prototype wireless, robotic vacuum cleaner: hamster-powered
  4. Speedy Safari 4 Beta has long way to go
  5. Microsoft Windows on a mainframe?
  6. Security expert worries about smartphone, Tiny URL threats
  7. Facebook redesign may earn thumbs down from ordinary users
  8. New smartphone controls may appeal to IT managers
  9. Helping to keep government's prying eyes at bay
  10. U.S. loses IPv6 leader
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: