PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
January 2006

Help From Above

Security managers are looking to the keepers of the Internet cloud for relief. Antigua--home of sunsets, sand and online point spreads--has become ground zero for Internet gambling. These offshore gambling sites are also prime extortion targets for organized criminals who threaten distributed denial-of-service attacks if monthly "protection money" isn't paid up. It's a scene right out of gangster movies with a high-tech twist. "We've been hosting some of these gaming sites, and they are literally being threatened by the mob," says Dr. Bill Hancock, former chief security officer at Savvis Communications, a Texas-based carrier and maintainer of an Internet backbone. "I've seen the e-mail messages. The gambling sites start off demanding $3,000 a month, then $30,000 a month. They may pay them off at first, but when it gets this expensive, there's no ROI. They turn to us asking, 'What can you do?'" Security managers for these gambling sites aren't the only ones asking that question. Others are also looking for a little help from ...

Access this PRO+ Content for Free!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

Safe Harbor

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Mining NetFlow

    Your routers and switches can yield a mother lode of security information about your network--if you know where to dig

  • Help From Above

    Security managers are looking to the keepers of the Internet cloud for relief.

  • Secure communications

    by  Dr. Juergen Schneider

    This tip covers ways that you can secure a network to protect data from internal as well as external attacks.

Columns in this issue