Storage

04:26 PM
Alison Diana
Alison Diana
Slideshows
Connect Directly
RSS
E-Mail
50%
50%

Top 10 Security Stories Of 2010

As smartphones and tablets complement and battle with notebooks and PCs as routes to the connected world, as corporate users and consumers turn to both traditional Web sites and newer social networking sites to communicate, share ideas, trade business concepts, and shop, corporate IT professionals and the government organizations overseeing the nation's cybersecurity are all-too aware they must do more. And they must do it fast. Recognizing this, the federal government hopes to create a new wave
Previous
5 of 10
Next


Although these raids were unlikely to make a huge dent in actual criminal enterprises, what is promising is the degree of cross-border cooperation happening. For example, the FBI worked with state agencies and law enforcement groups in other countries to bust the Zeus financial ring. In that case, federal and state officials charged 37 individuals after an investigation that began with the New York Police Department; Scotland Yard arrested 11 people in the United Kingdom. While there were no cybercrime treaties, per se, law enforcement agencies pursued relationships and shared information, which resulted in the successful pursuit and capture of many cyber criminals around the world, with the exception of Russia and certain former Soviet lands.

SEE ALSO:

FBI Busts Alleged Mega D Botnet Mastermind

Spam Down 47% After Botnet Busts

Researchers Down Koobface Botnet

Rustock Most Prolific Botnet

Zeus Botnet Targeting Retailer Credit Cards

Previous
5 of 10
Next
Comment  | 
Print  | 
More Insights
Slideshows
Cartoon
Audio Interviews
Archived Audio Interviews
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
White Papers
Register for Network Computing Newsletters
Current Issue
Video
Twitter Feed