Economy


Applicants Coerced Into Surfing Facebook While Employers Watch

If you want to get that slick job you’ve been gunning for, you might have to suffer a bit of snooping.  According to recent news reports, employers are increasingly asking applicants for jobs to submit their user credentials or asking to watch while applicants peruse their own social media account. 

The Global Illicit Economy

Nils Gilman, an author and entrepreneur, details the common themes and techniques that connect the actors in the illicit economies around the world, including the malware and botnet economies.

The Economics of Botnets

From Viruslist.com (Yury Namestnikov)
In the past ten years, botnets have evolved from small networks of a dozen PCs controlled from a single C&C (command and control center) into sophisticated distributed systems comprising millions of computers with decentralized control. Why are these enormous zombie networks created? The answer can be given in a single word: money.
A botnet, or zombie network, is a network of computers infected with a malicious program that allows cybercriminals to control the infected machines remotely without the users’ knowledge.  So how does one start? What does a cybercriminal in need of a botnet do? There are many possibilities, depending on the criminal’s skills. Unfortunately, those who decide to set up a botnet from scratch will have no difficulty finding instructions on the Internet.  Read the full paper (viruslist.com)


From SearchSecurity.com (Robert Westervelt)
The dismal economy has put the brakes on a lot of security projects, but the need to maintain the basics and automate some security functions has fueled interest in managed security services and some specific security areas, according to analysts at Gartner Inc.
Despite the dour economy, core security software functions are on pace to continue to grow, said Adam Hils, a principal research analyst with Gartner Research. Antivirus, antimalware and email security will continue to gain interest. New projects will be driven by regulatory compliance initiatives and areas affected by cost cutting measures. Read the full story [techtarget.com]

From CIO (Joan Goodchild)

The pickings are slim in the job market and the time line of interviewing and then hiring new people is slow. But there are positions available in the security field, according to three veteran security recruiters that we spoke with recently.

If you get a call that you’ve got a shot at a job interview, every move counts. How can you have an edge over other candidates angling for the same position? Our experts weigh in on important steps to excel when you get your chance to wow a possible new employer.  Read the full story [cio.com]

From PC Advisor (Carrie-Ann Skinner)
More than one third of employees would steal sensitive company information if they thought they could earn a decent price from the theft, says Infosecurity Europe.
Research by the security event organiser revealed that of those willing to steal sensitive data, 63 percent would expect at least £1m for their troubles, while 10 percent want enough to pay off their mortgage. Worryingly, 2 percent admitted all they’d want in return for data theft was a slap up meal. Read the full story [pcworld.com]

From ZDNet (Dancho Danchev)
In a recent blog post, the Cyber Secure Institute claims that based on their previous studies into the average cost of suck malware attacks, the economic loss due to the Conficker worm could be as high as $9.1 billion.
Despite that their analysis also considered a much limited infection rate (200,000 infected hosts), they claim that the cost of the virus in this case is still around $200 million. Read the full story [zdnet.com]

From CNet (Jon Oltsik)

It’s nearly time for that annual spring ritual: the RSA Conference at the Moscone Center in San Francisco. ESG data tells me that, despite the recession, global organizations continue to spend on security products. So I expect another good show, though I do anticipate that the $500 kegs of Heineken at vendor booths will be omitted or replaced with Bud Light.

With the show less than a week away, here is the buzz I am anticipating. For this year, I’m including my hyperbole-to-reality ratio in my assessment.  Read the full story [cnet.com]

From SearchSecurity (Robert Westervelt)
The glum economy has put increased pressure on CISOs to cut costs while maintaining the same security defenses. Tightening budgets, coupled with increased compliance demands could have security professionals looking for answers next week at the 2009 RSA Conference. Read the full story [searchsecurity.com]

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.