Search This Blog

Thursday, April 16, 2009

Botnets: It's Getting Harder to Find and Fight Them; Stealthy rootkit slides further under the radar

4 reasons the botnet fight is getting harder, and what to do about it
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

The Cost of Securing your Database
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Spotlight Story
Botnets: Reasons It's Getting Harder to Find and Fight Them

By Bill Brenner
The perpetual proliferation of botnets is hardly surprising when one considers just how easy it is for the bad guys to hijack computers without tipping off the users. Read full story

Related News:

Stealthy rootkit slides further under the radar Thousands of Web sites have been rigged to deliver a powerful piece of malicious software that many security products may be unprepared to handle.

Oracle delivers major security patch update Oracle released 43 security fixes on Tuesday for a range of applications, including its flagship database, Oracle Application Server, E-Business Suite, PeopleSoft Enterprise and WebLogic Server.

UC security: When the shoe doesn't fit - compress the foot If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified communications? This is a pattern that keeps repeating in many different areas: the security paradigm looked good until a technology comes along, changes the assumptions and reveals the inadequacy of the model.

CDT: Privacy, transparency needed in cybersecurity policy U.S. President Barack Obama's administration and Congress will have to address major civil liberties and transparency concerns as they create new policies to tackle ongoing cybersecurity vulnerabilties in the government and private industry, a digital rights group said.

Human ear could be next biometric system British scientists are investigating the viability of a new biometric technique that would make use of the human ear as a way for a third party to identify the person they are speaking to.

Deleted Data Drives New Data Breaches According to a new report on data breaches from Verizon Business, cyber criminals are no longer attacking where the credit card files are, but where they once were.

Encrypt more data with latest SecuriKey version When last we heard from the folks at GT SecuriKey, the makers of the hardware-software combo for securing laptops had just come out with a bundle aimed at mobile Mac users who also ran Windows on their portables via Boot Camp. Now the cross-platform data security company is updating all of its Mac offerings, with enhanced data encryption features in the latest version of SecuriKey.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Oracle
rule

The Cost of Securing your Database
Make the most of IT security and compliance dollars by ensuring your databases are secure. Get concrete tips and recommendations in this Live Webcast sponsored by Oracle, scheduled for Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. Learn how to cost-effectively safeguard sensitive and regulated information. Register for this Live Webcast now.

rule

Responsible for building a resilient data center
Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/16/09

Today's most-read stories:

  1. NASA takes Ethernet deeper into space
  2. EBay to spin off Skype by mid-2010
  3. Microsoft's Patch Tuesday filled with zero-day exploits
  4. Fact-checking the fact-checkers: Snopes.com gets an 'A'
  5. Managing IP addresses with free tools
  6. Exchange 2010: Sneak peek
  7. Breakthrough enables Terabit Ethernet
  8. 15 nifty BlackBerry apps for IT pros
  9. Exchange 2010 beta leads kickoff of new Office lineup
  10. Recession resistant: 10 technologies CIOs are still buying
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: