The only remaining key to preventing the expansion of Storm's zombie hordes may thus be prevention: If users stopped opening e-mail attachments from strangers--a basic security practice--Storm would lose its main avenue of infection.
According to security researchers at SANS Internet Storm Center, that's partly a result of a string of attacks on the Web.
For nearly a year, cyber-security researchers have tracked the Storm worm as its malicious code spread across the Internet, drawing computers into a growing botnet of hijacked computers.
Irene remains a "large and dangerous" storm, US Homeland Security Secretary Janet Napolitano warned on Saturday.
But even software scans may not be enough to detect the Storm worm, according to Internet Security Systems' Corman.
While the committee said it did not intend to assign blame, the report was especially critical of Homeland Security Secretary Michael Chertoff for his response to the storm.
That must be some die-hard IT control freaks, because the iPad seems to have taken the computing world by storm, including leading enterprises with high level security concerns, such as financial institutions.
Ms. Abernathy noted that aside from the unexpected height of the storm surge, Christie's was well prepared for Sandy, with generators on the roof that kept the security systems and climate controls up and running through the storm.
AeroVironment hopes to generate sales not just from services like the Army and Air Force, but also from the Central Intelligence Agency, the Department of Homeland Security (for help with border control) and weather services (for storm tracking and disaster recovery).
Homeland Security Secretary Michael Chertoff on Friday urged residents to leave in advance of the latest storm.
During the storm, Guarisco kept a nurse and a doctor, as well as security guards and National Guardsmen at the door.
Over the past week, researchers at Finnish security company F-secure have identified what they say is the first use of Storm's massive "botnet"--a collection of hundreds of thousands of computers hijacked with hidden software--to steal users' banking information.
Now, that zombie software is becoming more infectious and sophisticated: One strain in particular, the so-called "Storm worm, " has enslaved between 15 and 50 million PCs, by security researchers' estimates.
Today, transnational security threats such as terrorism, nuclear proliferation, pandemics, and climate change can cross borders as freely as a storm.
Security analysts at firms like Secureworks and Spamhaus have both been struck with denial of service attacks after publishing research on Storm, according to Corman.
应用推荐