Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Apple/Mac
24/7/365 Network Uptime
Average Rating:
Rate this article:  
April Patch Tuesday Is the Least of IT
April Patch Tuesday Is the Least of IT's Problems

By Jennifer LeClaire
April 10, 2013 8:59AM

    Bookmark and Share
Talking with us about Microsoft's April Patch Tuesday and other security concerns for IT administrators this week, security and forensic analyst Paul Henry warns that Apache server software is being used to facilitate drive-by malware attacks. The attacks are very dynamic, making it difficult for the security community to detect, let alone resolve.
 


(Page 2 of 2)

"The Apache server software is apparently being used to facilitate drive-by malware attacks. The attack is very dynamic, randomly serving malicious links to select users, but not others," Henry said. "The inconsistency is making it very difficult for the security community to detect, let alone resolve."

Henry called it an "incredibly stealthy piece of malware" and said despite the fact that attacks date all the way back to August, there is still no concrete information about mitigation. He expects to hear a lot more about Darkleech over the next few months and warns to look out for attacks.

"I'm also hearing a lot about DDoS again this month, thanks to the attack on Spamhaus, the largest attack in history, which is being credited with attempting to 'break the Internet'," Henry said. "Though cyber security attacks are occasionally blown out of proportion, in this case that's exactly what the attack tried to do. It used misconfigured DNS servers to generate and amplify traffic for the attack."

< Previous Page  |  1  |  2

 

Tell Us What You Think
Comment:

Name:

Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
What Verizon's Data Breach Report Can Teach Enterprises
It’s probably not a jaw-dropper, but cyberespionage is officially on the rise. And the use of stolen or misused credentials is still the leading way the bad guys gain access to corporate information.
 
Top Cyberthreats Exposed by Verizon Report
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.