LISTSERV mailing list manager LISTSERV 16.0

Help for IT-SECURITY-ALERT Archives


IT-SECURITY-ALERT Archives

IT-SECURITY-ALERT Archives


IT-SECURITY-ALERT@LISTSERV.UNL.EDU


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

IT-SECURITY-ALERT Home

IT-SECURITY-ALERT Home

IT-SECURITY-ALERT  November 2010

IT-SECURITY-ALERT November 2010

Subject:

eWeek: Four Security Tips for IT Managers

From:

Luke Chretien <[log in to unmask]>

Reply-To:

Luke Chretien <[log in to unmask]>

Date:

Tue, 16 Nov 2010 13:10:27 -0600

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (83 lines)

Four Tips for IT Managers: Crimeware Increasing Its Profile Within the 
Enterprise
(Link: http://www.smartertechnology.com/c/a/Smarter-Strategies/Four-Tips-
for-IT-Managers-Crimeware-Increasing-Its-Profile-Within-the-Enterprise/?
kc=EWKNLCSM11162010BESTOF4 )

(2010-11-08) - Contributed by Dennis McCafferty

Whether via social networks, Google or your e-mail in-box, cyber-rogues will 
seek a way into your network to disrupt business, steal company data and 
otherwise make life miserable for IT managers. A new report from CA 
Technologies reveals the latest trends for these intrusions—and how to stop 
them.

There are more than 400 new families of Internet threats—led by rogue 
security software, downloaders and backdoors. Trojan intrusions are the most 
common of these incidents, accounting for nearly three-quarters of the total 
threat infections reported worldwide.

The Trojan's current MO? "Crimeware-as-a-service," which is the underlying 
purpose of nearly all of these attacks.

These are some of the more troubling findings revealed in a recent report from 
CA Technologies, titled "State of the Internet 2010: A Report on the Ever-
Changing Threat Landscape." Crimeware is nothing new.  But what has 
changed are the service models that practitioners are adopting, says Don 
DeBolt, director of Threat Research and Internet Security for CA Technologies.

"This new method of malware distribution makes it more challenging to identify 
and remediate," DeBolt says. "Fortunately, security professionals and 
developers are diligent about staying one step ahead of these cyber-criminals."

Here's what tech managers need to know about a number of disruptive 
developments:

1.  Crooks like the cloud. Crimeware-as-a-service is essentially a way of 
turning your enterprise assets into an ATM for cyber-criminals. They can 
harvest valuable information through a malware infection and then generate 
multiple revenue streams. And cloud computing is the new, favored delivery 
model.

2.  Status Update: "We've Been Hit!" Social media such as Facebook and 
Twitter are popular among the abusers too, CA Technologies reports, as a 
black market is evolving to push social-networking bots. Underground 
marketers promote new social networking applications and services that 
include account checkers, wall posters, wall likers, wall commenters, fan 
inviters and friend adders. Enterprise managers can't stop employees from 
using social networks, as they've proven to have a high level of value as a 
business tool. But they can take proactive steps to ensure internal users 
aren't falling into a dangerous trap (see the tips below).

3.  Phony security software likes Google. The search engine giant is the 
preferred target for distribution of rogue software through Blackhat SEO, 
which takes users to infected Website domains, according to the report. 
Rogue security software displays bogus alerts following installation and will 
coerce users to pay for the fake product or service. Then, there's what's 
called "rogue security software cloning," in which the software employs a 
template that constructs its product name based on the infected system's 
Windows operating system version, making itself look all the more legit.

4.  Where's that spam coming from anyway? Report researchers tracked the 
usage of unique IP addresses to find out which regions originate the most junk 
e-mail. The results: The European Union ranked as the top source of spam, at 
31 percent; Asia Pacific and Japan ranked second (28 percent); India, third 
(21 percent); and the United States, fourth (18 percent).


CA Technologies offers these tips to tech managers to ensure employees are 
taking the proper steps to avoid a crippling attack:

Tip 1. Verify authenticity before opening URLs or attachments. Prevent default 
browsers from automatically opening PDF docs. 

Tip 2. Encrypt online communication and confidential data. Check for and 
install security updates regularly.

Tip 3. Don't open e-mail from unknown parties. Be equally cautious when 
instant messaging.

Tip 4. While social network tools are critical to many organizations now, be 
wary of clicking links or suspicious profiles. Be aware when installing extras 
such as third-party applications; they may lead to malware infection, or 
attackers could use them to steal your identity.

Top of Message | Previous Page | Permalink

Advanced Options


Options

Log In

Log In

Get Password

Get Password


Search Archives

Search Archives


Subscribe or Unsubscribe

Subscribe or Unsubscribe


Archives

April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
August 2013
June 2013
April 2013
March 2013
February 2013
January 2013
November 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010

ATOM RSS1 RSS2



LISTSERV.UNL.EDU

CataList Email List Search Powered by the LISTSERV Email List Manager