Search This Blog

Monday, April 13, 2009

Conficker Starts Scamming; Twitter virus strikes; Making a PBX botnet out of Skype or Google Voice?

Conficker botnet could flood Web with spam
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Juniper Networks
rule

Gaining Competitive Edge Through Network Virtualization - Live Webcast April 14
Discover how real-world companies are maximizing performance while minimizing cost with network virtualization. In this Live Webcast, experts share specific examples of how enterprises are engineering highly scalable, distributed networks with controlled latency and enhanced privacy.

rule

Spotlight Story
Conficker Awakens, Starts Scamming

By Ian Paul
The Conficker worm is back in action and stumping security experts once again. One of the most craftily designed pieces of malware recently got an update and is finally starting to behave like other worms. Here's what's going on: Read full story

Related News:

Twitter virus strikes Monash: Twitter was hit Saturday by the StalkDaily virus. Twitter had a virus (or worm) whose main symptom is that your Twitter account sends out certain tweets. The virus could be contracted by visiting affected Twitter profile pages.

Making a PBX 'botnet' out of Skype or Google Voice? Flaws in popular Internet-based telephony systems could be exploited to create a network of hacked phone accounts, somewhat like the botnets that have been wreaking havoc with PCs for the past few years.

Cisco scammers coming out of the woodwork Nothing metes out justice like Eastertime. Just as one Cisco scammer is sentenced, another has pled guilty to the same misdeeds, according to MercuryNews.com.

Cisco scamster gets 6 years Stephen Edward Miller, the Cisco SMARTnet scamster who pled guilty to money laundering and mail fraud last year, has been sentenced to 6-1/2 years in prison, according to news reports in Portland, OR. Miller will also have to pay restitution for the $3.7 million worth of Cisco equipment and parts obtained under the money laundering and mail fraud scheme.

Imperva adds risk assessment tool to its database protection Imperva is adding risk assessment to its SecureSphere database-security platforms in an effort to make it simpler to protect the most sensitive corporate data.

Conficker botnet could flood Web with spam Windows PCs infected with the Conficker worm have turned into junk mail-spewing robots capable of sending billions of spam messages a day, a security company warned today.

Conficker Shows Its Colors, Installs Rogue Anti-virus We knew it would try to make a buck somehow, but until now Conficker hasn't done much beyond spread and update. That changed yeThursday, when the worm began installing a rogue antivirus app called SpywareProtect2009 on infected machines.

Russian President warns of foreign threat to 'Net security Foreign investors in Internet companies pose a potential threat to national security, Russian President Dmitry Medvedev warned members of the United Russia political party at a meeting on Wednesday.

Top Trends: Patch Management Find out how patch-management products work, and what they can do for you, in this Product Guide.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Juniper Networks
rule

Gaining Competitive Edge Through Network Virtualization - Live Webcast April 14
Discover how real-world companies are maximizing performance while minimizing cost with network virtualization. In this Live Webcast, experts share specific examples of how enterprises are engineering highly scalable, distributed networks with controlled latency and enhanced privacy.

rule

Responsible for building a resilient data center

Then don't miss Network World's one-day conference and expo devoted to best practices and new solutions. Hear top analysts. Meet key vendors. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Register now to attend free: Visit http://www.nww.com/rpgx.jsp?c=XU1PHA1012Z4303.

DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/13/09

Today's most-read stories:

  1. Fearing and loathing in Windows 7
  2. Conficker, the Internet's No.1 threat, gets an update
  3. Are you an IT geezer? (and we mean that in a good way)
  4. Microsoft eating up U.S. and global netbook markets
  5. Feds join Twitter revolution
  6. How serious is threat to power grid?
  7. Report: Nokia Siemens bids for much of Nortel
  8. 10 eye-catching gadgets at CTIA
  9. EMC, VMware promise major virtualization, storage upgrades
  10. Cisco to buy Tidal Software for $105 million
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free at http://www.nww.com/rpgx.jsp?c=XU1PHB1012Z4303.

IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: