Botnets

Botnets employ huge armies of computing devices taken over against the will of their owners. Often, machines are impressed into these recalcitrant armies through Trojans and worm infections. Precise figures are difficult to come by in this shadowy world, but botnets such as Storm, Mega-D and Celebrity reach legendary proportions. They are used for various purposes, none of them very pleasant, and are segmented and rented out by their owners. Botnets generally are run by organized gangs.


Articles

Enterprise App Developers and the Evolution of Mobility

The drama surrounding the emergence of numerous mobile and wireless devices running on numerous operating systems has a number of interesting subplots. These subplots are of increasing interest to IT More >

Wanted: A New Approach to Open Source in Business

When the Free Software Foundation released version 3 of the GNU General Public License in June, most in the open source community knew it would make ripples -- and maybe even require significant More >

More Articles >

Interviews

Know Your Network to Defend Your Network

Sugiarto Koh is regional director for Sourcefire, a security vendor specializing in network security solutions that spans a broad spectrum of organizations, including finance, defense, health care and the IT sector.

More >

Security Staffs: BYOD Is Here to Stay, Deal with It Proactively

The emergence of BYOD is perhaps the most important trend in IT management of the past decade. AlgoSec CTO Avishai Wool said that IT’s first step toward security in this challenge environment is proactively accepting that the changes are here to stay. He told IT Business Edge blogger Carl Weinschenk that current and future technology will make BYOD a safe way to do business — if they are utilized.

More >

HIPS, HIPS, Hooray!

Carl Weinschenk spoke with Brian O'Higgins, CTO for Third Brigade.   Weinschenk: How is malware changing?O'Higgins: Malware continues to evolve. The computer security business is different than More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

2014 Holiday Shopping Trends Revealed

Security Staffing

The holiday season is an important one for retailers, but as shoppers become more savvy, every detail retailers can glean about shopper behavior can contribute to the bottom line.

 More >

Twitter Rethinks Authentication and Access

Women ‘Need to Be Willing to Try,’ Female Tech CEO Says

Canonical Upgrades Ubuntu Linux Distributions

SAP Collapses HANA Infrastructure Stack

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Job Description: iOS Mobile Application Developer Job Description: iOS Mobile Application Developer

Use this sample job description to aid your search for qualified candidates or as a template for polishing your own resume....

Top 10 Sources of Firewall Blocks - October 2009 Top 10 Sources of Firewall Blocks - October 2009

This table is taken from Network Box's report on Globalization of Malware Production....

Malware Tunneling in IPv6 Malware Tunneling in IPv6

IPv6 can be misused to deliver malware in a way that eludes detection by firewalls or intrusion detection systems (IDS) not c...

Guide to Intrusion Detection and Prevention Systems Guide to Intrusion Detection and Prevention Systems

IDPSs monitor your network and report possible attacks and threats....

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.