Search This Blog

Wednesday, October 14, 2009

Botnet production eerily like commercial code practice

Sidekick meltdown is a cloud security issue; Computer programmers ready for smash-mouth brain battle
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Cisco
rule

Beefing up Email Security by Teaming with a Leader
Improve your email security practices after watching this Webcast. Your email security choices extend beyond on-premise only solutions. Improve your anti-spam, visibility, content filtering and encryption support with hosted, hybrid and managed email security services.

Click here to learn more.

rule

Spotlight Story
Botnet production eerily like commercial code practice

Botnets are elaborate command-and-control systems used by criminals for sending spam, stealing personal information or launching denial-of-service attacks through hijacked computers. But their underlying malware code structures share common ways to evade detection, and even mimic some commercial code practices, such as digital methods to prevent copying and reverse engineering, says one researcher. Read full story

Related News:

Sidekick meltdown is a cloud security issue
Anyone considering cloud computing and data security has to take pause at the colossal mistake at Microsoft/Danger over the weekend.

Computer programmers ready for smash-mouth brain battle
A smart people smack-down is set to start next week where thousands of university computer researchers will pit their brains and machines in a grueling battle of logic, strategy, and mental endurance.

BBN doles out $11.5M for advanced research network development
BBN said this week it would give out $11.5 million worth of National Science Foundation grants to 33 research teams to help develop technology for the futuristic network infrastructure project known as GENI.

Barracuda gobbles up SaaS security start-up Purewire
Barracuda Networks has acquired start-up Purewire in an effort to expand its footprint in the market for Web security services.

Missing dot drops Sweden off the Internet
What was essentially a typo last night resulted in the temporary disappearance from the Internet of almost a million Web sites in Sweden -- every address with a .se top-level down name.

Free tool protects Twitter users from malware hiding behind tiny URLs
AVG Technologies is offering a free tool to protect Twitter users from malicious sites that lurk behind shortened URLs.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Why Small Companies Should Think Outside Box for Protecting Endpoints
In their "Sector Insight" study, Aberdeen Group investigated the considerations small business should take when selecting anti-malware solutions. Read this paper to learn why Aberdeen recommends small enterprises be open to endpoint security solutions from vendors other than McAfee and Symantec.
Read Now


Driving Revenue and Increasing Value with Application Performance Management
Service Providers face more competing pressures than ever. You have to deliver a responsive, secure web experience for your customers. Reduce operational costs, while simplifying your complex environment. And find new opportunities for next-generation service delivery to boost revenues. Now you can do it all – with Blue Coat Systems.
Read Now

 

October 14, 2009

MOST-READ STORIES

  1. Developer ups iPhone app to $40 after complaints about price
  2. House decommissions last mainframe, saves $730k
  3. Sidekick fiasco highlights need for mobile backups
  4. Sidekick users livid
  5. Compromised e-mail accounts exploited in fake shopping scam
  6. Barracuda gobbles up SaaS security start-up Purewire
  7. From Sidekick to Gmail: A history of cloud computing outages
  8. Engineers fix shortcoming of firewalls
  9. Microsoft loses Sidekick users' personal data
  10. 7 tools to ease your Windows 7 rollout

Vulnerability Management Checklist
Discover the 12 key decision points you need to consider when choosing a vulnerability management solution. This checklist walks you step-by-step through critical questions to ensure you select the solution that will best protect your network and data.
Learn more now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: