Feeds

Zombie bots clog internal networks

The enemy within

Combat fraud and increase customer satisfaction

A significant chunk (12 per cent) of all scanning attacks found on a broadband service provider's network are launched from the machines of its own subscribers. That's according to a study by traffic management firm Sandvine which says its findings dispel the idea the broadband security involves only policing the borders between external and internal networks. Subscribers need to be protected from each other as well as external malicious hosts, it concludes.

Most of these "internal attackers" are likely unsuspecting victims themselves, unwitting hosts to malware infections that turn their Windows PCs into zombie drones under the control of hackers. An infected subscriber often reports performance degradations and other problems to the help desk, oblivious to the real reason why their computer seems sluggish or is behaving strangely. All the while his (it's nearly always blokes who get their machine infected by viruses) machine is searching for other vulnerable hosts.

"If the enemy is already loose within the gates, it doesn’t matter how high the walls are," said Dave Caputo, president and Chief exec of Sandvine. Caputo argues strong network-edge and anti-virus defences are only one necessary part of defending against internet attacks. Naturally Sandvine is at hand to bridge this defensive gap with its anomaly detection and traffic management software. Sandvine study is based on networks data gathered across a sample of its broadband service provider customers. ®

SANS - Survey on application security programs

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.