Search This Blog

Monday, October 04, 2010

Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.

Introducing the FBI's Zeus Trojan crime ring most wanted poster | Debriefing: The 21st-century CSO skills challenge

Network World Security

Forward this to a Friend >>>


Zeus Trojan bust reveals sophisticated 'money mules' operation in U.S.
Court documents released on Thursday related to indictments over a massive international financial cybercrime operation provide a fascinating -- if scary -- glimpse into how the crooks operated within the U.S. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

WHITE PAPER: EMC

RSA Solution for Cloud Security and Compliance
RSA Solution for Cloud Security and Compliance offers a solid foundation that enables security and compliance of VMware environments to be addressed systematically so organizations can confidently continue their journey to virtualization and cloud computing models Read Now.

Introducing the FBI's Zeus Trojan crime ring most wanted poster
FBI tackles huge cyber crime investigation Ah their parents must be proud. In one of the largest cyber criminal cases the FBI has ever investigated, the crime fighting agency today released a package of information about the bust this week of an alleged group of criminals that targeted the accounts of medium-sized companies, towns, and even churches. Before they were caught, members of the theft ring managed to steal $70 million, the FBI stated.... Read More

Debriefing: The 21st-century CSO skills challenge
Security skill 1 Read More

Why did Stuxnet worm spread?
Stuxnet's inability to stay stealthy may be fall-out from a failure to hit its intended targets last year, security researchers said today. Read More


WHITE PAPER: NetGear

NETGEAR® Stream Scanning Technology
Security solutions must keep a company safe from the constant barrage of Internet-based threats without slowing down the speed of business. Where other technologies have failed, NETGEAR Stream Scanning architecture successfully achieves this balance. Learn more.

In Security Outsourcers We Trust
The push to shrink security staff means more companies are outsourcing security functions to MSSPs, according to this year's Global Information Security Survey. Read More

How to Keep Your Kids Safe on Facebook
Boasting 500 million users worldwide and still growing, Facebook is now ubiquitous. Because of its popularity, minors have jumped onto the social media bandwagon, too, and they use networking the same way adults do--to share pictures, connect with friends, organize events, and play social games. And that can be a problem. Read More

IT industry warned of advanced persistent threats
Singapore's security industry has been strongly urged to re-think the way IT security architectures are designed and built, and to devise strategic solutions to better protect organisations. Read More


WEBCAST: Splunk

SIM Overview and Market Drivers
Forrester Senior Analyst, John Kindervag provides an overview of what issues are driving SIM adoption and some of the key capabilities end users should look for when evaluating a SIM solution. View now!

Is Stuxnet an Israeli-invented attack against Iran?
Was Stuxnet, a sophisticated piece of malware designed to attack industrial control systems (ICS), secretly invented by Israel to attack Iran's industrial controls systems? Read More

Android Apps Spy on Users: 8 Tips to Boost Privacy
Worried your Android apps are spying on you? You should be, according to a recent study that found several popular Android Apps regularly share your location and critical phone data such as your phone number with advertisers and others. Researchers from Intel Labs, Penn State, and Duke University randomly selected 30 out of 358 popular apps from the Android Market for this study. The computer scientists were able to track each application's behavior using a special monitoring program called TaintDroid developed by the researchers. Read More

DHS to Launch SAR Database. In Suspicion and Surveillance We Trust?
On October 12, DHS will implement its database of "suspicious activity reports" (SAR). Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Meet RIM's BlackBerry PlayBook
Research in Motions heats up the tablet wars with BlackBerry PlayBook that aims to outshine Apple and Samsung when it comes to business appeal.

A brief history of Android
In this slideshow we'll take you back in time to trace the origins of the Android operating system and show how it rose rapidly to become one of the top operating systems in the mobile world.

MOST-READ STORIES

  1. Zeus botnet bank thieves were careless with own security
  2. Is Stuxnet an Israeli-invented attack against Iran?
  3. Many Android apps leak user privacy data
  4. Google is world's most attractive employer; Microsoft drops to No.7
  5. Zeus trojan bank-theft scheme extends to U.S.
  6. Cisco eats its own IPv6 dog food
  7. Top 10 funniest Internet memes
  8. Microsoft's Security Essentials running on 31 million PCs
  9. Professionals: Don't use Facebook and Twitter
  10. HP spins CEO carousel, picks wrong horse in Apotheker

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: