Search This Blog

Wednesday, April 01, 2009

Conficker activation passes quietly, threat isn't over; UltraDNS service knocked offline by attack

Cloud Security Alliance formed to promote best practices
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

The Cost of Securing your Database
Former Gartner analyst and founder of security consulting firm Securosis, Rich Mogull will explain how to make the most of IT security and compliance dollars by ensuring your databases are secure. Learn concrete tips and recommendations in this Live Webcast Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. entitled "Cost-Efficient Security and Compliance." Register Today.

rule

Spotlight Story
Conficker activation passes quietly, but threat isn't over

Sumner Lemon By Sumner Lemon
An expected activation of the Conficker.c worm at midnight on April 1 passed without incident, despite sensationalized fears that the Internet itself might be affected, but security researchers said users aren't out of the woods yet. Read full story

Related News:

UltraDNS service knocked offline by attack NeuStar confirmed that its UltraDNS managed DNS service was knocked offline for several hours Tuesday morning by a distributed denial of service attack.

Blocking Conficker domain names: Will it work? On the eve of Conficker.C's expected activation date, April 1, more than 100 providers of top-level domains around the world are trying to block the registration of tens of thousands of domain names that the Conficker worm could start using Wednesday to get botnet instructions.

FAQ: Conficker clock ticks toward April 1 deadline When a computer worm reaches the critical mass necessary to make it onto last Sunday's 60 Minutes, you know it's either a once-in-a-blue-moon threat or something that's been hyped beyond belief.

Conficker's patch gambit exposed by researchers One technique deployed by the Conficker worm is to patch vulnerable Microsoft-based computers it has invaded. But University of Bonn researchers recently discovered that the Conficker patch is sufficiently different than the official Microsoft patch, giving security firm Qualys the opportunity to fine-tune its scanner to pinpoint computers where Conficker lies hidden under its own protective patch.

Conficker Set to Strike: Protect Yourself with These Tips Security watchdogs warn that millions could be affected by the Conficker worm tomorrow - unfortunately this is not in an April Fool's Day joke. Over 9 million PCs are already infected and a new variant of the virus could threaten those who didn't patch their PCs with the latest security updates.

What you need to know about the Conficker worm If you've been paying attention to general computer news, you may have read about the Conficker worm, and what may (or may not) happen to Windows PCs that are infected with Conficker on April 1. The worm has received a lot of attention, leading more than a few Mac users to ask about the worm's impact on OS X. Mac security maker Intego received so many inquiries that the company added a Conficker entry to its blog.

Cloud Security Alliance formed to promote best practices A group calling itself the Cloud Security Alliance announced its formation Tuesday, with eBay and ING as founding members.

Fools and jokers coming to a network near you While there is little known about the origins of April Fools' Day, the list of gags go on and on and this year is certain to add to the list of potty-themed Wii games, scratch-and-sniff Web sites and police-finding mobile applications.

Fedora 11 beta posted with new security, developer features The Fedora Project released a beta of the next version of its free Linux OS with new security, desktop and developer features that provide a glimpse of the direction Red Hat could take with its enterprise Linux distribution.

Fidelis spies data leakage via social networking sites Fidelis Security Systems is looking to help enterprises monitor and block specific content that employees might try to post in social networking arenas.

Fraud in Canadian firms mostly an 'inside job' Who is the most likely suspect for fraud in Canadian organizations?

China denies cyber spy network charges China on Tuesday denied suggestions it could be involved in a cyberespionage ring that attacked computers worldwide from servers mostly based in the country.

Video: Europe probes online tracking methods European Commission officials launch investigation into the growing use of deep packet inspection techniques that let broadband providers track online activity, even if consumers delete tracking cookies.

Training needed to quell breaches As many highly publicized security breaches demonstrate, sometimes the greatest threat to an organization comes from within when well-meaning employees make mistakes such as losing an unencrypted laptop or posting personally identifiable information online.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Oracle
rule

The Cost of Securing your Database
Former Gartner analyst and founder of security consulting firm Securosis, Rich Mogull will explain how to make the most of IT security and compliance dollars by ensuring your databases are secure. Learn concrete tips and recommendations in this Live Webcast Thursday, April 16, 2009 at 2:00 p.m. ET/11:00 a.m. PT. entitled "Cost-Efficient Security and Compliance." Register Today.

rule

Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now


The Need for an Adaptive Threat Management Architecture - Live March 31.
Create a more secure and efficient network. Find out how in this Live Webcast, "The Need for an Adaptive Threat Management Architecture." Join us on Tuesday, March 31, 2009, at 1:00 p.m. ET/10:00 a.m. PT. Get real-world advice from Jon Oltsik, senior analyst at consulting firm Enterprise Strategy Group.
Register today for this Live Webcast.

 

04/01/09

Today's most-read stories:

  1. Conficker on April 1st: Eve of destruction or big joke?
  2. Mobile Skype: The end of cellular as we know it
  3. Top 10 technology skills
  4. Conficker's patch gambit exposed by researchers
  5. The 10 worst Microsoft product names of all time
  6. Deep computer-spying network touched 103 countries
  7. Feds give $50 billion IT services deal a second try
  8. Preparing for the Pre: Palm and Sprint must get it right
  9. Seven reasons MPLS has been wildly successful
  10. Fake security software scammers jump on Conficker
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09. Next up.. NYC-Feb, Denver-March, Chicago-April.
Select your city, register and attend free!



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: