Thursday, June 23, 2011

Ukraine disrupts $72M Conficker hacking ring

Computerworld Security: June 23, 2011
===============================================================

Ukraine disrupts $72M Conficker hacking ring

Ukraine's security service said on Thursday it had disrupted a cybercrime ring
that cost the banking industry more than US$72 million using Conficker, a
fast-spreading worm unleashed in 2008.
http://cwonline.computerworld.com/t/7400292/818816221/517953/0/

~~~~~~~~~~~~~~~~~~~WHITE PAPER: Mimecast~~~~~~~~~~~~~~~~~~~~~

Security-as-a-Service: Threat Mitigation from the Cloud

The cloud isn't just the most effective place to secure email, before any
threats or intruders ever reach your network; it's also the most efficient.
Cloud-based email services can offer full protection with the promise of
availability and reliability too.

http://cwonline.computerworld.com/t/7400292/818816221/517954/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


IN THIS ISSUE

1. Update: Feds bust international gangs distributing scareware products
http://cwonline.computerworld.com/t/7400292/818816221/517955/0/

2. 90% of companies say they've been hacked: Survey
http://cwonline.computerworld.com/t/7400292/818816221/517956/0/

3. LulzSec members to be outed by hacking group
http://cwonline.computerworld.com/t/7400292/818816221/517957/0/

4. U.K. police charge hacker linked to LutzSec
http://cwonline.computerworld.com/t/7400292/818816221/517958/0/

5. Brazilian government, energy company latest LulzSec victims
http://cwonline.computerworld.com/t/7400292/818816221/517959/0/

6. Startup Bromium takes aim at cloud security
http://cwonline.computerworld.com/t/7400292/818816221/517960/0/

7. Home port for security departments?
http://cwonline.computerworld.com/t/7400292/818816221/517961/0/

8. Darragh Delaney: File hosting services and their data leakage risks, Part II
http://cwonline.computerworld.com/t/7400292/818816221/517962/0/


~~~~~~~~~~~~~~~~~~~WHITE PAPER: Webroot~~~~~~~~~~~~~~~~~~~~~

Why Web Security is Best Served in the Cloud

Download this informative whitepaper to find out why web security is best served
in the cloud. Fran Howarth, Bloor Research senior security analyst, examines the
benefits of applying protection where threats are being created - at the
Internet layer.

http://cwonline.computerworld.com/t/7400292/818816221/517963/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Update: Feds bust international gangs distributing scareware products

U.S. federal law enforcement authorities working in cooperation with their
counterparts in more than 10 countries have disrupted the operations of two
gangs responsible for distributing malicious scareware programs to more than 1
million people.
http://cwonline.computerworld.com/t/7400292/818816221/517955/0/

90% of companies say they've been hacked: Survey

A a survey of 583 U.S companies, 90% of the respondents said their companies
computers were breached at least once by hackers over the past 12 months.
http://cwonline.computerworld.com/t/7400292/818816221/517956/0/

LulzSec members to be outed by hacking group

A hacking group in the Netherlands promises to publish photos, phone numbers and
addresses of LulzSec members in response to similar treatment by LulzSec.
http://cwonline.computerworld.com/t/7400292/818816221/517957/0/

U.K. police charge hacker linked to LutzSec

Authorities in the U.K. today charged a 19-year-old with using a botnet he
controlled to take down the Web site of a national police unit.
http://cwonline.computerworld.com/t/7400292/818816221/517958/0/

~~~~~~~~~~~~~~~~~~~RESOURCE COMPLIMENTS OF: Cisco Systems, Inc. ~~~~~~~~~~~~~~~~~~~~~

Transform Your Business with Video

Business video is exploding in popularity. As video becomes increasingly
pervasive, businesses need to uncover the most efficient and productive ways to
deploy the media. Cisco Services offers four detailed white paper series—plus
complementary short videos—that outline practical steps for harnessing the power
of video and realizing the best ROI.

http://cwonline.computerworld.com/t/7400292/818816221/511056/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Brazilian government, energy company latest LulzSec victims

Websites belonging to the Brazilian government and energy giant Petrobras were
knocked offline Wednesday in a series of cyberattacks.
http://cwonline.computerworld.com/t/7400292/818816221/517959/0/

Startup Bromium takes aim at cloud security

Simon Crosby, the former CTO of Citrix Systems' data center and cloud business,
has formed a startup called Bromium that will aim to solve security problems in
a cloud environment.
http://cwonline.computerworld.com/t/7400292/818816221/517960/0/

Home port for security departments?

In June of 2003, we ran a long article about organizational structures. We
titled it "All Over the Map," which pretty much tells you what we concluded
about how security was handled at the time: a bit like a ship with no home port,
passing from executive to executive. The article had examples of security
variously reporting to Human Resources, Facilities, Operations, Legal, and IT.
Responsibility without authority was a theme.
http://cwonline.computerworld.com/t/7400292/818816221/517961/0/

Darragh Delaney: File hosting services and their data leakage risks, Part II

Over the past few months I have looked at a range of file hosting services.
While using these services, I have being monitoring the network traffic as I
upload and download files. So far I have found that most of the popular files
hosting services use encryption for sending and receiving data.

http://cwonline.computerworld.com/t/7400292/818816221/517962/0/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

CAST YOUR VOTE IN OUR LATEST QUICKPOLL


Do you like the direction Microsoft is headed in with Windows 8?

http://cwonline.computerworld.com/t/7400292/818816221/517845/0/


SHARK TANK OF THE DAY
______________________

Stop me before I map again!

Flashback to a decade ago, when this Air Force pilot fish is tasked with
training her organization's webmasters in how to map a network drive -- not a
difficult task in Windows XP. But one of the webmasters keeps calling to ask how
to map her drive again.

http://cwonline.computerworld.com/t/7400292/818816221/517896/0/

NEW COMPUTERWORLD JOB BOARD
______________________________

Search multiple listings now and get new job alerts as they are posted.

http://cwonline.computerworld.com/t/7400292/818816221/156832/0/


Get more IT peer perspective online:

LinkedIn Group: http://cwonline.computerworld.com/t/7400292/818816221/311619/0/

Facebook: http://cwonline.computerworld.com/t/7400292/818816221/311620/0/

Twitter: http://cwonline.computerworld.com/t/7400292/818816221/311621/0/

===============================================================

CONTACTS/SUBSCRIPTIONS

You are currently subscribed to computerworld_security as: jonsan3511@gmail.com.

To unsubscribe from this newsletter, go to:
http://cwonline.computerworld.com/t/7400292/818816221/131135/0/?90482085=aHR0cDovL2N3b25saW5lLmNvbXB1dGVyd29ybGQuY29tL3U%2faWQ9ODE4ODE2MjIxLjRhYjhkNzUwOWY0NGExODFmZDY2YmZlOGMyNDBhMjllJm49VCZsPWNvbXB1dGVyd29ybGRfc2VjdXJpdHkmbz03NDAwMjky&x=160bb7aa

To manage your subscription preferences, go to:
http://cwonline.computerworld.com/t/7400292/818816221/72510/0/

To subscribe to a newsletter, go to:
http://cwonline.computerworld.com/t/7400292/818816221/231613/0/

Computerworld's online privacy policy is at:
http://cwonline.computerworld.com/t/7400292/818816221/72509/0/

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly,
send an e-mail to online@computerworld.com **

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:56 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive