News

Wednesday, November 28, 2007

What Is the Russian Business Network?

PLEASE VISIT OUR SPONSORS, WHO BRING YOU SECURITY UPDATE FOR FREE:

Messaging Management

http://list.windowsitpro.com/t?ctl=6F1FA:4160B336D0B60CB1219550389E8BC503

Comparing Email Management Systems that Protect Against Spam, Viruses,
Malware, & Phishing Attacks

http://list.windowsitpro.com/t?ctl=6F200:4160B336D0B60CB1219550389E8BC503

Improving Backup & Recovery RPO RTO in a SAN

http://list.windowsitpro.com/t?ctl=6F1FC:4160B336D0B60CB1219550389E8BC503


=== CONTENTS ===================================================

IN FOCUS: What Is the Russian Business Network?

NEWS AND FEATURES
- Hofstra University to Offer Master's Degree Online
- New Security Standards for Programmers
- Recent Security Vulnerabilities

GIVE AND TAKE
- Security Matters Blog: Use Good Judgment Before Using Tor
- FAQ: What Is VMRCplus?
- Share Your Security Tips

PRODUCTS
- Secure Your File and Data Transfers
- Product Evaluations from the Real World

RESOURCES AND EVENTS

FEATURED WHITE PAPER

ANNOUNCEMENTS


=== SPONSOR: Symantec ==========================================

Messaging Management
Guarding against the growing threats to the corporate email and IM
environment has become an ever-consuming task of the IT professional.
Now is the turning point for IT security professionals to look at their
mainstays in their defense strategy and make sure they are pulling
their weight. In scrutinizing your messaging management solutions, this
valuable guide shows that securing a mail and messaging infrastructure
should not be an afterthought. A secure mail and messaging
infrastructure is fundamental to your business and any organization
should plan for the appropriate message hygiene, availability, and
control services from the start.
Download this free resource before evaluating message management
solutions.

http://list.windowsitpro.com/t?ctl=6F1FA:4160B336D0B60CB1219550389E8BC503


=== IN FOCUS: What Is the Russian Business Network? ============
by Mark Joseph Edwards, News Editor, mark at ntsecurity / net

The Russian Business Network (RBN) is doing a fantastic job of making a
very bad name for itself, and the effort seems to be deliberate.

In case you haven't heard of RBN, it's an ISP that's become notorious
as a haven for prolific spammers and purveyors of malware, a host of
cyber criminals, an origination point for Distributed Denial of Service
(DDoS) attacks, and a suspected facilitator of a list of other criminal
activity.

Security professional David Bizeul spent three months studying RBN and
collecting data to map out the organization's activities along with its
networks and business structure. Bizeul's research includes his own
findings as well as tidbits from other security-related entities. The
research was made available to the world on November 20 in a 70-page
detailed report.

Although someone from RBN recently tried to defend the company as being
a legitimate business operator (see the Wired blog posting at the first
URL below), Bizeul's research indicates otherwise. At a minimum, the
company seems to serve as an online haven for cyber crime. However, RBN
might actually operate on the margins of Russian law. You can read more
about the issue at The Washington Post's Web site, at the second URL
below.

http://list.windowsitpro.com/t?ctl=6F203:4160B336D0B60CB1219550389E8BC503

http://list.windowsitpro.com/t?ctl=6F1F9:4160B336D0B60CB1219550389E8BC503

According to Bizeul, RBN has created an entire Internet business
infrastructure around its activities, including a network of numerous
hosting companies, ISPs, and telecom operations along with top-level
network peering arrangements with companies that operate Internet
traffic exchange points. Bizeul dug into the company's networks and
discovered that they're plastered with all sorts of malicious content,
including malware, pirated software, and child pornography. He also
unmasked a group of entities that seem to be operating in unison, if
they aren't all actually operated by RBN.

Reading the report (in PDF format at the URL below) is eye-opening. It
helps give a good understanding of just how far some people will go
toward obscuring the exact nature of their business, and it also
provides some information that you could use to help defend your own
networks. Toward the end of the report, on page 48, Bizeul provides a
list of networks that can be blocked at your network borders to prevent
any communication between your network and networks known to be
operated by RBN.

http://list.windowsitpro.com/t?ctl=6F20F:4160B336D0B60CB1219550389E8BC503

Another set of networks that you might consider blocking is provided by
Spamhaus in its Don't Route or Peer List (DROP). Spamhaus describes the
list as "consisting of stolen 'zombie' netblocks and netblocks
controlled entirely by professional spammers. DROP is a tiny sub-set of
the [Spamhaus Block List] designed for use by firewalls and routing
equipment."

http://list.windowsitpro.com/t?ctl=6F212:4160B336D0B60CB1219550389E8BC503


=== SPONSOR: Sunbelt Software ==================================

Comparing Email Management Systems that Protect Against Spam, Viruses,
Malware, & Phishing Attacks
As a system administrator, you're tasked with researching email
security tools to find out which one will work best for your company.
Sunbelt Software engaged Osterman Research to survey enterprises that
are using five of the leading email management systems that protect
against spam, viruses, malware and phishing attacks. Read this white
paper for the results of this survey and learn what email security
product takes 50% less time to manage and has a lower cost per user. A
must-read for any administrator researching email security tools for
Microsoft Exchange.

http://list.windowsitpro.com/t?ctl=6F200:4160B336D0B60CB1219550389E8BC503


=== SECURITY NEWS AND FEATURES =================================

Hofstra University to Offer Master's Degree Online
Beginning in January, working professionals can earn their master's
degree in computer science through online courses at Hofstra
University.

http://list.windowsitpro.com/t?ctl=6F209:4160B336D0B60CB1219550389E8BC503

New Security Standards for Programmers
More than 40 organizations have joined together to develop standards
for secure programming. The group, which calls itself the Secure
Programming Council, released a draft of its first proposed standard
aimed at Java and JavaEE developers.

http://list.windowsitpro.com/t?ctl=6F207:4160B336D0B60CB1219550389E8BC503

Recent Security Vulnerabilities
If you subscribe to this newsletter, you also receive Security
Alerts, which inform you about recently discovered security
vulnerabilities. You can also find information about these
discoveries at

http://list.windowsitpro.com/t?ctl=6F201:4160B336D0B60CB1219550389E8BC503


=== SPONSOR: EqualLogic ========================================

Improving Backup & Recovery RPO RTO in a SAN
More and more companies are deploying storage area networks or SANs
as storage needs continue to proliferate. SANs offer many unique
capabilities that improve data protection, storage performance and
scaling, and reduction in storage management time. This web seminar
reviews best practices in deploying SQL Server in an intelligent iSCSI
SAN, and shows how this provides dramatic improvements in deploying,
optimizing, backing up, and recovering SQL.

http://list.windowsitpro.com/t?ctl=6F1FC:4160B336D0B60CB1219550389E8BC503


=== GIVE AND TAKE ==============================================

SECURITY MATTERS BLOG: Use Good Judgment Before Using Tor
by Mark Joseph Edwards, http://list.windowsitpro.com/t?ctl=6F20E:4160B336D0B60CB1219550389E8BC503

The Onion Router (Tor) can be useful in situations in which you need
to tunnel out of a network or mask your originating IP address. But
intruders can use Tor against you as a tool to hijack your sessions and
snoop on your data.

http://list.windowsitpro.com/t?ctl=6F1FD:4160B336D0B60CB1219550389E8BC503

FAQ: What Is VMRCplus?
by John Savill, http://list.windowsitpro.com/t?ctl=6F20C:4160B336D0B60CB1219550389E8BC503


Q: What is Virtual Machine Remote Control Client Plus (VMRCplus)?

Find the answer at

http://list.windowsitpro.com/t?ctl=6F208:4160B336D0B60CB1219550389E8BC503

SHARE YOUR SECURITY TIPS AND GET $100
Share your security-related tips, comments, or problems and
solutions in Security Pro VIP's Reader to Reader column. Email your
contributions to r2r@securityprovip.com. If we print your submission,
you'll get $100. We edit submissions for style, grammar, and length.


=== PRODUCTS ===================================================
by Renee Munshi, products@windowsitpro.com

Secure Your File and Data Transfers
SSH Communications Security announced SSH Tectia 6.0, which features
SSH Tectia ConnectSecure. ConnectSecure is designed to help
organizations secure FTP file transfers and data in transit without
requiring modifications to applications, scripts, or infrastructure.
The product includes automatic FTP-SFTP (Secure FTP) conversion and
transparent FTP and TCP tunneling. SSH Tectia ConnectSecure is
available on Windows, UNIX, and Linux platforms and works with SSH
Tectia Servers and other Secure Shell server products, including
OpenSSH. SSH Tectia 6.0 also features SSH Tectia Client for Windows
6.0, which now supports transparent TCP tunneling and automatic
tunneling in addition to Secure Shell port forwarding. For more
information, go to

http://list.windowsitpro.com/t?ctl=6F213:4160B336D0B60CB1219550389E8BC503

PRODUCT EVALUATIONS FROM THE REAL WORLD
Share your product experience with your peers. Have you discovered a
great product that saves you time and money? Do you use something you
wouldn't wish on anyone? Tell the world! If we publish your opinion,
we'll send you a Best Buy gift card! Send information about a product
you use and whether it helps or hinders you to
whatshot@windowsitpro.com.


=== RESOURCES AND EVENTS =======================================
For more security-related resources, visit

http://list.windowsitpro.com/t?ctl=6F20B:4160B336D0B60CB1219550389E8BC503

Don't Miss this Windows Server 2008 Virtual Event!
Get the detailed, real-world insight you need to plan for and
implement the key functionality of Microsoft's newest server release in
this virtual event Dec. 4, 2007.

http://list.windowsitpro.com/t?ctl=6F20A:4160B336D0B60CB1219550389E8BC503

Create an Environment for Sustaining Compliance.
Compliance is not a single-point-in-time project--mandates, systems,
and businesses change and evolve. This free Essential Guide discusses
compliance solutions that can reduce costs while improving compliance
and realizing business value from compliance efforts. Find a solution
that improves your security posture, ensures that you're complying with
multiple mandates, and generates reports that demonstrate your
compliance.

http://list.windowsitpro.com/t?ctl=6F1FF:4160B336D0B60CB1219550389E8BC503

Discover the benefits of employing SharePoint 2007 to manage
information throughout the enterprise. Learn the basics of the content
management process and understand how workflow and information
management policies are implemented in Office SharePoint Server 2007
solutions. After listening to this podcast, you'll be able to develop a
tactical approach to your own automated processing solutions that's
easy to implement and use.

http://list.windowsitpro.com/t?ctl=6F1FB:4160B336D0B60CB1219550389E8BC503


=== FEATURED WHITE PAPER =======================================

Compliance Mythbusters: The Truth About Common Myths and Misconceptions
of Email Archiving
Learn from other people's mistakes, not your own! This Web seminar
reveals the common mistakes and misconceptions about message archiving,
regulations, and e-discovery. You'll learn how these misconceptions
came about, how to avoid common mistakes, and what to do to meet
today's email archiving and e-discovery needs.

http://list.windowsitpro.com/t?ctl=6F1FE:4160B336D0B60CB1219550389E8BC503


=== ANNOUNCEMENTS ==============================================

EXCHANGE 2007 Mastery Series--January 28, 2008
3 info-packed eLearning seminars for only $99!
Hosted by Windows IT Pro
Join Mark Arnold--MCSE+M, Microsoft MVP--as he coaches you through
Exchange 2007: planning for archiving and compliance, optimizing your
iSCSI network storage, finding the sweet spot between memory and
spindles.

http://list.windowsitpro.com/t?ctl=6F202:4160B336D0B60CB1219550389E8BC503

Packed with thousands of articles, bonus content, and loads of expert
advice, the Windows IT Pro Master CD is like having your very own team
of professional SQL Server consultants in your pocket. Get real-world
solutions lightning-fast--order the Windows IT Pro Master CD today.
Includes a one-year subscription to all online content at
WindowsITPro.com!

http://list.windowsitpro.com/t?ctl=6F206:4160B336D0B60CB1219550389E8BC503


================================================================

Security UDPATE is brought to you by the Windows IT Pro Web site's
Security page (first URL below) and Security Pro VIP (second URL
below).

http://list.windowsitpro.com/t?ctl=6F20D:4160B336D0B60CB1219550389E8BC503

http://list.windowsitpro.com/t?ctl=6F211:4160B336D0B60CB1219550389E8BC503

Subscribe to Security UPDATE at

http://list.windowsitpro.com/t?ctl=6F205:4160B336D0B60CB1219550389E8BC503

Unsubscribe by clicking

http://list.windowsitpro.com/u?id=4160B336D0B60CB1219550389E8BC503

Be sure to add Security_UPDATE@list.windowsitpro.com
to your antispam software's list of allowed senders.

To contact us:
About Security UPDATE content -- letters@windowsitpro.com
About technical questions -- http://list.windowsitpro.com/t?ctl=6F210:4160B336D0B60CB1219550389E8BC503

About your product news -- products@windowsitpro.com
About your subscription -- windowsitproupdate@windowsitpro.com
About sponsoring Security UPDATE -- salesopps@windowsitpro.com

View the Windows IT Pro privacy policy at

http://list.windowsitpro.com/t?ctl=6F204:4160B336D0B60CB1219550389E8BC503

Windows IT Pro, a division of Penton Media, Inc.
221 East 29th Street, Loveland, CO 80538
Attention: Customer Service Department

Copyright 2007, Penton Media, Inc. All rights reserved.

No comments:

Blog Archive