Search This Blog

Thursday, November 10, 2011

FBI takes out $14M DNS malware operation

IT must prepare for Hadoop security issues | Banks fending off brazen hacker raids on business accounts

Network World Security

Forward this to a Friend >>>


FBI takes out $14M DNS malware operation
US law enforcement today said it had smashed what it called a massive, sophisticated Internet fraud scheme that injected malware in more than four million computers in over 100 countries while generating $14 million in illegitimate income. Of the computers infected with malware, at least 500,000 were in the United States, including computers belonging to U.S. government agencies, such as NASA. ... Read More


RESOURCE COMPLIMENTS OF: Sophos

Free Mobile Security Toolkit from Sophos
Get resources to help you secure smartphones and tablets plus educate your users on mobile security risks. Learn more

WEBCAST: ForeScout Technologies

CISO in the Know - Mitigating Modern Attacks
This webcast examines sophisticated and targeted threats, security gaps, techniques and new technologies with regards to understanding and defending against zero-day threats, propagating worms, low-and-slow attacks and advanced persistent threats (APT). Learn more.

IT must prepare for Hadoop security issues
Corporate IT executives need to pay attention to numerous potential security issues before using Hadoop to aggregate data from multiple, disparate sources, analysts and IT executives said at the Hadoop World conference here this week. Read More

Banks fending off brazen hacker raids on business accounts
Banks are having to fend off ever more attacks from hackers who break into computers of their business customers and try to make fraudulent funds transfers electronically for large amounts. If you doubt how bad this hacker scourge has become, ask Jorge Solis, senior vice president of security at First Midwest Bank. Read More

The 33 hottest tech arguments
Network World and IDG News Service have assembled this collection of primers examining today's most explosive and intriguing networking and IT issues, from vendor rivalries to product battles to technology trends. Read More


WHITE PAPER: Oracle

The Application Grid Approach to a Modern Data Center
An application grid approach significantly automates the process of adding, reducing, or modifying existing IT deployments in support of highly scalable systems that have less downtime and lower resource consumption. Learn More!

Patent trolls vs. innovation
When Google, Apple, Microsoft and the like bash each other about the corporate head and shoulders with their ever-expanding patent portfolios, no one worries that the legal-department combat will kill the companies' respective research and development operations. Read More

Allow social media vs. ban social media at work
The pull of social media is proving hard to resist. Even the most buttoned-down institutions are rethinking bans and relaxing access to social networks and social media sites. But just how far are enterprises willing to wade into the sea of social media? Read More

6 More Mistakes Managers Make When Firing Employees
Terminating an employee is one of the hardest things a manager will ever have to do. Because firing someone can be so emotionally charged and logistically complicated, it's an easy process to mess up. Here are six more common mistakes managers make. Read More


WHITE PAPER: IBM

A Smarter Approach to CRM
With instant access to information, customers expect a purchase experience that matches the ease and speed of the information-gathering experience. Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Read Now

The Network Is The Security
How do you detect sophisticated attacks in progress? It isn't easy. Large organizations collect data from a number of sources like log files and NetFlow and then organize and analyze this data using tools like log management and SIEM. Based upon the recently-published ESG Research Report, "U.S. Advanced Persistent Threat Analysis," these tried-and-true security methods are no longer enough. Read... Read More

Lookout Mobile Security plans expansion outside the US
After winning over U.S. operators with its security software for Android phones, Lookout Mobile Security is turning to Europe to find new networks ready to install or promote its software on the phones they distribute. Read More

Underground calling service helps cybercriminals extract sensitive info
Researchers from security vendor Trusteer have come across a professional calling service that caters to cybercriminals. The business offers to extract sensitive information needed for bank fraud and identity theft from individuals. Read More

Apple bans researcher for exploit exposing iOS security flaw
Apple has banned well-known security researcher Charlie Miller from its developer program, for creating an apparently benign iOS app that was actually designed to exploit a security flaw he had uncovered in the firmware. Read More



SLIDESHOWS

Wi-Fi security do's and don'ts
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Juniper at the root of Internet outage?
  2. How Hotmail will wage war on newsletters
  3. Steve Jobs' advice to Facebook's Mark Zuckerberg
  4. Apple bans researcher for app exposing iOS security flaw
  5. Microsoft patch snuffs out major worm potential
  6. Fabric wars: Cisco vs. Brocade vs. Juniper
  7. Brocade takes on Cisco in the campus
  8. Google+ Pages: 5 things you need to know before signing up
  9. Tech argument: Tablets vs. laptops vs. smartphones
  10. Corporate-owned vs. employee-owned mobile devices

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: