Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/28/2013
02:14 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Kindsight Empowers Internet Service Providers To Defend Against Botnets

Kindsight Botnet Security service analyzes Internet traffic for communications between infected devices and the bot masters’ C&C servers

RSA CONFERENCE – SAN FRANCISCO, CA – February 26, 2013 – Kindsight, a network-based security company, today announced the Kindsight Botnet Security service to help Internet service providers detect botnet activity in the network and protect subscribers against bot infections. The Kindsight solution is embedded within the service providers' networks to analyze Internet traffic for communications between infected devices and the bot masters' command-and-control (C&C) servers.

Throughout the past few years, botnets have become a growing concern in the US and around the world. During 2012, four of the top five high-level threats to home networks were botnets, according to Kindsight Security Labs. In fact, almost 50% of home network infections last year were the result of malware related to botnets. That's why Kindsight has developed a new security solution specifically to address botnets, backed by research from its Security Labs.

The Kindsight Botnet Security service is built upon the network-based malware detection capabilities of the Kindsight Network Intrusion Detection System (NIDS-8800). When it detects a botnet infection from a subscriber, the solution can take action by placing infected devices into a walled garden where subscribers will receive instructions and tools to help them remove the threat. The Kindsight NIDS sensor can also block infected devices from communicating with C&C servers, preventing hackers from sending instructions and launching other attacks.

"Once a computer is part of a botnet, the infection can be very difficult to remove," said Kevin McNamee, security architect and director, Kindsight Security Labs. "But service providers are in a unique position to help their subscribers, who often don't know that their computer is at risk. We're offering a solution for service providers to put a stop to these threats--not just to detect botnet activity but to help their subscribers remove the underlying threat."

Kevin McNamee will be presenting new botnet research at RSA Conference and Security B-Sides San Francisco (February 25 – March 1) and is available to discuss the issue and Kindsight solutions. To schedule a briefing, please contact [email protected]

To learn more about Kindsight Botnet Security, please visit: http://www.kindsight.net/serviceprovider/detecting-botnet-infections

Stay up-to-date on Kindsight with the company blog: http://www.kindsight.net/blog

Follow Kindsight on Twitter: http://www.twitter.com/Kindsight

About Kindsight

Kindsight, a majority-owned subsidiary of Alcatel-Lucent, offers network-based security products that are deployed by Internet service providers and mobile network operators to detect threats, send alerts, block infected devices and protect subscribers. Backed by the expertise of Kindsight Security Labs, the Kindsight Security Analytics solution analyzes Internet traffic for malware and pinpoints infected devices to identify risks and take action. To generate revenue and increase brand loyalty, the white-labeled Kindsight Security Services enable operators to launch differentiated, value-added services that combine network-based and device-based security for complete protection. Visit www.kindsight.net for more information.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5118
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
CVE-2019-12422
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
CVE-2012-4441
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.
CVE-2019-10764
PUBLISHED: 2019-11-18
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which m...
CVE-2019-19117
PUBLISHED: 2019-11-18
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.