Analysis of Storm Worm DDoS Traffic
The Peacomm (Storm Worm) botnet is known to launch DDoS attacks against networks which appear to be investigating the botnet ? the cyber equivalent of explosive reactive armor. It is still unclear...
View ArticleSecureWorks Assists FTC in Spammer Takedown
A federal judge has ordered spammers to pay more than $2.5 million for violating federal laws including the CAN-SPAM Act. SecureWorks provided expert testimony including an analysis of spam messages...
View ArticleCleaning Up E-Gold? Not Likely.
?On Monday, the Nevis, West Indies, company, its founder and two senior directors all agreed to plead guilty to various charges related to money laundering and the operation of an unlicensed money...
View ArticleKyrgyzstan Under DDoS Attack From Russia
?The Cyber Attack No One Is Talking About? Since January 18, 2009, the two primary Kyrgyzstan ISPs (www.domain.kg, www.ns.kg) have been under a massive, sustained DDoS attack almost identical in some...
View ArticleCyber Security Preparedness for the 2010 G-20 Summit
Canada will soon host the G-20 summit in Toronto, Ontario. The G-20, short for the ?Group of Twenty Finance Ministers and Central Bank Governors?, meets to discuss policy and issues affecting...
View ArticleSpace weather’s role in return to Stone Age greatly exaggerated
The Space Weather Enterprise Forum was held on June 8, 2010, at the National Press Club in Washington, DC. NASA, The National Aeronautic and Space Administration (NASA) and the National Oceanic and...
View ArticleDedicate a Separate Computer for Online Safety
Publicly, SecureWorks has long recommended using a separate computer dedicated exclusively to online banking, online retail purchases, account management, and other financial transactions. This would...
View ArticleWhat the Gozi Gang Leaders’ Arrests Mean to the Future of the Gozi Trojan
The FBI has arrested three individuals and charged them with running a cybercrime operation that has stolen millions from bank accounts worldwide over the past six years. The criminals delivered...
View ArticleThe Mobile Cyber Threat; Go Away, We Are Not Compatible
By Don Smith, director of technology at Dell SecureWorks The way we engage with and use technology each day is changing. We wake up, we check our smartphones. We travel to work and we read the news on...
View ArticleAssess & Evaluate your Information Security Strategy: Lessons from Dell...
By Don Smith, Director of Technology, Dell SecureWorks The Dell SecureWorks Counter Threat Unit (CTU) has observed cyber threats becoming more advanced as hackers seek new ways to breach information...
View Article