Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

×
Security

+ - Half of Fortune 500 Infected w/ DNSChanger Malware-> 1

Submitted by wiredmikey
wiredmikey (1824622) writes "Despite the recent success in taking down a criminal operation that operated a massive DNSChanger malware operation, new research shows that the malware is still prevalent and lingering in many corporate and government networks.

In fact, according to recent analysis, approximately half of all Fortune 500 companies and major U.S. federal agencies are infected with DNSChanger malware.

Security firm IID says that it found at least 250 of all Fortune 500 companies and 27 out of 55 major government entities had at least one computer or router that was infected with DNSChanger in early 2012.

If an enterprise’s employee has DNSChanger on their computer, it means that enterprise is susceptible to having their proprietary information stolen because DNSChanger disables Anti-Virus.

While the FBI replaced rogue DNS servers operated by the cybercriminals with legitimate servers for 120 days, without further court actions, on March 8, 2012, infected computers and routers will have no servers to handle their DNS requests, the Internet may literally go dark for people using those computers or routers and create a major help desk issue."

Link to Original Source
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

Half of Fortune 500 Infected w/ DNSChanger Malware

Comments Filter:

Make it right before you make it faster.

Working...