Feeds

Plug pulled Latvian cybercrime hub

Bullet proof host taken down

Secure remote control for conventional and virtual desktops

Upstream providers have pulled the plug on Latvian ISP Real Host over allegations it maintained cybercrime servers linked to the Zeus botnet.

Real Host was disconnected by its upstream provider, Junik, on Monday, after TeliaSonera told Junik to either cut the juice or face sanctions itself, according to reports by the FT and other news outlets.

Like other disconnected hosting companies before it, such as McColo and Atrivo, Real Host was linked to an unsavory list of botnet-related cybercrime activities.

Security researchers, who described Real Host as a cybercrime and bullet proof hosting hub, said its systems acted as command and control nodes for the Zeus botnet and a locus for exploits based on a recently patched Adobe Flash exploit, among other crimes. Hostexploit has a full breakdown of the extensive charge sheet against Real Host here.

The enforcement action against Real Host is the first time the internet community put pressure on upstream providers to take action on an allegedly rogue ISP in eastern Europe. ®

Remote control for virtualized desktops

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.