Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
Microsoft/Windows
Is your endpoint data protected?
Average Rating:
Rate this article:  
April Patch Tuesday Is the Least of IT
April Patch Tuesday Is the Least of IT's Problems

By Jennifer LeClaire
April 10, 2013 8:59AM

    Bookmark and Share
Talking with us about Microsoft's April Patch Tuesday and other security concerns for IT administrators this week, security and forensic analyst Paul Henry warns that Apache server software is being used to facilitate drive-by malware attacks. The attacks are very dynamic, making it difficult for the security community to detect, let alone resolve.
 


(Page 2 of 2)

"The Apache server software is apparently being used to facilitate drive-by malware attacks. The attack is very dynamic, randomly serving malicious links to select users, but not others," Henry said. "The inconsistency is making it very difficult for the security community to detect, let alone resolve."

Henry called it an "incredibly stealthy piece of malware" and said despite the fact that attacks date all the way back to August, there is still no concrete information about mitigation. He expects to hear a lot more about Darkleech over the next few months and warns to look out for attacks.

"I'm also hearing a lot about DDoS again this month, thanks to the attack on Spamhaus, the largest attack in history, which is being credited with attempting to 'break the Internet'," Henry said. "Though cyber security attacks are occasionally blown out of proportion, in this case that's exactly what the attack tried to do. It used misconfigured DNS servers to generate and amplify traffic for the attack."

< Previous Page  |  1  |  2

 

Tell Us What You Think
Comment:

Name:

Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Ruling Against Microsoft Raises E-Mail Privacy Concern
Microsoft has been ordered to hand over e-mails to law enforcers in the United States as part of a criminal investigation, even though the e-mail is stored at a data center in Dublin,Ireland.
 
Twitter Buys Password Manager Startup Mitro
Following on the heels of another acquisition earlier this week, Twitter is adding to its fold a password-manager security startup called Mitro, which in turn is releasing its code as open source.
 
Government Requests for Customer Data Skyrocket
Requests for customer data from the government jumped 50 percent in the first half of 2014, according to Twitter, which received more than 2,000 requests for user info from gov't agencies.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.