The Cybersecurity A...
 
Notifications
Clear all

The Cybersecurity Act of 2009

23 Posts
11 Users
0 Reactions
8,237 Views
(@seanmcl)
Honorable Member
Joined: 19 years ago
Posts: 700
 

No one in Washington looks at this, either

http//www.shadowserver.org/wiki/pmwiki.php/Stats/BotnetMaps

Note the relative intensity of the US compared to parts of the world where such activity is assumed to originate. A prize goes to the person who can name the ISP responsible for the big hotspot in the American Southwest,


   
ReplyQuote
jhup
 jhup
(@jhup)
Noble Member
Joined: 16 years ago
Posts: 1442
 

Interesting.

A lot of InfraGard members are asking in one of the largest chapters, what is their purpose?

If most of the various infrastructures are managed or overseen, in some way and shape, by the Federal Government, what is the purpose of the private sector involvement in information sharing with Federal LE?


   
ReplyQuote
(@patrick4n6)
Honorable Member
Joined: 16 years ago
Posts: 650
 

No one in Washington looks at this, either

http//www.shadowserver.org/wiki/pmwiki.php/Stats/BotnetMaps

Note the relative intensity of the US compared to parts of the world where such activity is assumed to originate. A prize goes to the person who can name the ISP responsible for the big hotspot in the American Southwest,

Not knowing anything about SW USA ISPs, I'm going to say Comcast.

And I say that because when I was talking to one of MS's researchers about BotNets, he told me that they did a test and put an unpatched Windows box on a Comcast connection, and it was owned in less than 14 minutes.

Comcast is the big target, and hence it gets more notice, just like how Windows gets a lot more virus attention than MacOS, because criminals want return on investment, and you're going to get more results fishing in the bigger pond.


   
ReplyQuote
Page 3 / 3
Share: