Access "ISP shutdown latest cat-and-mouse game with hackers"
This article is part of the July/August 2009 issue of Why privileged account management is critical to today's data security
Information Security magazine, July-August issue Download the entire July-August issue of Information Security magazine here in PDF format. When the FTC shut down California-based ISP Pricewert in June, it was only a temporary victory for the U.S. government in the war on cybercrime. Still, the action signaled an important notice to cybercriminals around the world: the Feds are watching. The shutdown of Pricewert, also known as 3FN.net and APS Telecom, occurred on June 5 and spam and phishing campaigns dipped for several days, according to several antispam vendors. But while the ISP went dark, disrupting one of the largest and most active spam botnets known as Cutwail, the blow to cybercriminals was short lived at best. Experts say those in control of the command-and-control servers likely had a contingency plan in place, acting quickly to regain control of their zombie computers to resume spamming runs and other more nefarious activities. "What happens is you take out one of the big boys and somebody will take over those customers and start spamming for ... Access >>>
Premium Content for Free.
ISP shutdown latest cat-and-mouse game with hackers
While the 3FN.Net shutdown had limited impact on cybercriminals, it signaled that the private sector and the government are serious about illegal activity.
DNSSEC deployments gain momentum since Kaminsky DNS bug
DNSSEC brings PKI to the Domain Name System and prevents dangerous cache poisoning attacks. Implementation difficulties and political battles, however, keep it from going mainstream.
- ISP shutdown latest cat-and-mouse game with hackers
Privileged account management critical to data security
Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts.
Unified threat management products gaining midmarket, enterprise foothold
Unified threat management (UTM) appliances offer consolidated security services in a single, manageable firewall/VPN appliance. But purchase and use only the security options you need. Otherwise you will pay too much for the appliance and for tools that won't make your business more secure
- Privileged account management critical to data security
Editor's Desk: Google security needs HTTPS by default
Security's leading thinkers ask Google to turn on HTTPS by default for Gmail, Docs and Calendar.
Align your data protection efforts with GRC
Data protection and compliance teams battle for resources but need each other to succeed.
- Editor's Desk: Google security needs HTTPS by default
More Premium Content Accessible For Free
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...