Yesterday I guest blogged at Control Global about remediation steps for process automation networks and I've been thinking some more about the topic.
Today there are, as usual, a number of active botnets, zero day exploits and purveyors of miscellaneous malware. The one that has received all the publicity is the Windows LNK file exploit which seems to be designed to attack Siemens SCADA systems. Another one that popped up on the Shadow server listserv is a new sort of malware that packed in such a way that it is not detected by any current anti-virus program - and that will mutate easily to evade the detection algorithms of most anti-virus programs.
ThreatSTOP wants to celebrate a nation's successful revolt against overseas oppression by helping Internet users free themselves from external oppressors - the bot herders. Just like the British 200 plus years ago the bot herders take your property - in this case CPU cycles, network bandwidth and sensitive data - without your consent. And just as the citizens of the 13 colonies banded together to successfully fight against their oppressors; Internet users can band together to fight the cybertyrants using ThreatSTOP. In celebration of the 4th of July, we are offering a 10% discount for all services paid for from July 6th until July 12th. Just sign up at www.threatstop.com and use the coupon code "FREEDOM".