UPDATED 12:17 EDT / APRIL 06 2012

NEWS

CyberSecurity Weekly Roundup: From Kelihos to Cloudlock

Starting this week, SiliconANGLE brings you cybersecurity roundup to sum up the latest happenings in the Internet security space. This is a particularly important area as the Internet becomes a lethal weapon in the digital age.

Last week, Cloudlock raised $8.7 million in series B funding from new investor Ascent Venture Partners and existing investor Cedar Fund to expand its cloud security portfolio. Luke Burns of Ascent Venture Partners will join the company’s board. Cloudlock capitalizes on the vulnerabilities of Google as it offers a suite of security applications that protects data stored in Google Docs and Google Sites. Some of Google Apps’ largest customers are also partners of Cloudlock.

With cyber punks on their glory days defacing websites and leaking sensitive information to the world, websites are in need of better products and services to secure their websites. As a premier brand in database security, McAfee answers to this problem and released a free downloadable audit plug-in for MySQL to address the need of medium-sized to large enterprises.

Adding to the long list of countries that have become a hub for malicious hackjobs, telecoms company LIME Barbados revealed in a press release that the Caribbean experienced attacks on their Internet infrastructure from an external source. They assured, however, that the incident is not serious and that there were no servers compromised. It seems as if the Caribbean Government doesn’t pay enough attention to these critical issues, as pointed out by ICT Pulse.

Shifting our sights away from the cloud, botnet Kelihos had been on life and death transition for the past 6 months. It was reportedly taken down by Microsoft on September 2011 only to be found wild again not too long after. At the moment, the botnet is said to be dead, thanks to a team composed of Kaspersky Labs experts, the CrowdStrike Intelligence Team, Dell SecureWorks and members of the Honeynet Project who pulled out all the stops to kill the remains for good. It wasn’t an easy feat since the botnet changed mechanism, shifting from central command-and-control server to peer-to-peer communication. An action-packed programmer vs. programmer clash took place but the team of experts emerged as the victor in the end.

Big data comes in the aid of experts in cybersecurity as well. The American government, particularly the Pentagon, has begun capitalizing on big data to aid Pentagon’s Defense Advanced Research Projects Agency and its Cyber-Insider Threat or CINDER program. Big data will be used to decode foreign secrets in the event of cyber infiltration.

Joining Facebook and Twitter among the largest social media networks that plagues of fiddles, Pinterest is the new fertile soil for phishers and scammers. But this is only natural. You can’t possibly amass 13 million users without raking one or two scammers among them. Symantec said these cyber punks trick users to give out their passwords, financial account and other sensitive info, and even get them get them to inadvertently install malware on their PC.


A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU