Access "Botnet takedowns: A dramatic defense"
This article is part of the April 2013 / Volume 15 / No. 3 issue of Managing identities in hybrid worlds
Botnets remain a major challenge for infosec professionals. Companies such as Microsoft and Symantec have proclaimed success using legal and technical countermeasures to disrupt a few of the Internet’s more egregious botnets, but we’re not likely to shrug ourselves free of this scourge anytime soon. The growing sophistication of the malware used to propagate bots—seen, for example in 2012’s peer-to-peer ZeroAccess bot—combined with creative monetization schemes, make botnets resurface almost as quickly as they are knocked down. After a CrowdStrike dismantling in March 2012, the Kelihos 3 botnet, reestablished itself within 20 minutes of a significant takedown. There are steps security pros can take to help keep bots off their networks, but the infections and cyberattacks that botnets are sometimes used to launch, remain hard-to-detect malware threats for websites and increasingly, mobile devices. As much as anything, botnets are about the money. Consider the ZeroAccess bot. First identified in 2011, ZeroAccess ranked at the top of security researchers’ ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Managing identities in hybrid worlds
by Peter H. Gregory
Are you losing control of access management as SaaS and mobile devices take hold? To achieve better operational consistency and scale, consider a centralized IAM system.
-
Address IPv6 security before your time runs out
by Fernando Gont
Most networks have partial deployment of IPv6 often without IT realizing it. It’s time to take stock of the security implications before attackers do.
-
Managing identities in hybrid worlds
by Peter H. Gregory
-
-
Botnet takedowns: A dramatic defense
by Kathleen Richards
The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices.
-
Botnet takedowns: A dramatic defense
by Kathleen Richards
-
Columns
-
Security transitions: Changes that make a difference
by Robert Richardson
This month, Information Security Magazine examines security industry changes that can really make a difference: improving identity management and building security into software from the get go.
-
CISOs: From no seat to multiple hats
by David J. Sherry
The CISO role in many enterprises is expanding beyond security risk mitigation to risk management, privacy and regulations, and compliance.
-
Why information security education isn’t making the grade
by Doug Jacobson and Julie A. Rursch
Security experts explain why a holistic approach to security is critical to training computer engineers and computer scientists for a career in information security.
-
Cyberwar calls for software and system investment, not hacking back
by Gary McGraw, Contributor
Hacking back isn't the way to win the cyberwar. Gary McGraw says building software and systems with fewer vulnerabilities is stronger protection.
-
Security transitions: Changes that make a difference
by Robert Richardson
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...