Search This Blog

Tuesday, May 05, 2009

Botnet probe turns up 70G bytes of personal, financial data; USA (and IE) No. 1 for Botnet Mayhem

Researchers gained control over a well-known and powerful network of hacked computers for 10 days
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

Spotlight Story
Botnet probe turns up 70G bytes of personal, financial data

By Jeremy Kirk
Researchers from the University of California gained control over a well-known and powerful network of hacked computers for 10 days, gaining insight into how it steals personal and financial data. Read full story

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Password Seeks Partner For Long-Term, Secure Relationship Passwords have been standing guard over our computer user accounts seemingly forever; for a long while, and for most purposes, they could go it alone.

USA (and IE) No. 1 for Botnet Mayhem Research from security vendor Finjan suggests enterprise IT shops are losing the war against those who would hijack company computers for botnets. Almost half the victims appear to be in the U.S. -- most using Microsoft's Internet Explorer (IE) browser.

In the Trenches, as the Threats Evolve Recent security incidents at my company have gotten me thinking about the state of information warfare. Electronic break-ins are progressing in a direction that makes me fear that the nature of the threats is changing.

Critics argue against a White House security lead Critics raised questions last week about the growing chorus of calls for the White House to play a leading role in coordinating cybersecurity efforts involving the federal government and key private-sector industries.

Heartland earns back spot on PCI-approved list The processing firm Heartland Payment Systems has been reinstated to Visa Inc.'s list of service providers deemed compliant with the Payment Card Industry Data Security Standard (PCI DSS).

New blogger in town Michael Watkins, who will be blogging about CCNA security on the Cisco Subnet for the month of May, gets started by sharing his background in computer networking and technology.

May Giveaways
Cisco Subnet
, Microsoft Subnet and Google Subnet are collectively giving away books on Google Apps Deciphered, the CCNA Security exam, an awesome SQL Server 2005/2008 training video and the grand prize, a Microsoft training course from New Horizons worth up to $2,500. Deadline for entries May 31.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by RSA Security
rule

Security Operations 2.0: What does this mean for you?
Forrester and RSA On- Demand Webcast: Webcast reviews the following topics: Why are more and more companies putting a greater emphasis on building a security operations center or function? What should your top priorities be to build the most effective security operations? How can the latest release of RSA enVision (R) platform help you use security to meet your ongoing business objective To listen to the replay

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

05/05/09

Today's most-read stories:

  1. Illinois programmer sues Google over "Android"
  2. Why mix Bluetooth with Wi-Fi?
  3. Use the Cisco restroom at your own risk
  4. Is it time to cut the Ethernet access cable?
  5. Some IT skills see pay hikes during downturn
  6. Juniper bolsters branch router, switch lines
  7. LexisNexis says its data was used by fraudsters
  8. Who's on deck to replace Cisco's Chambers?
  9. Microsoft aligning management, clouds
  10. Eliminate network gear maintenance fees to save big money
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: