http://www.pcworld.com/article/257045/update_linkedin_confirms_account_passwords_hacked.html
By Ian Paul, PCWorld Jun 6, 2012 8:32 AM

UPDATED 2:15 p.m. PT
http://www.pcworld.com/article/257045/update_linkedin_confirms_account_passwords_hacked.html
By Ian Paul, PCWorld Jun 6, 2012 8:32 AM

UPDATED 2:15 p.m. PT
A well-known security consultant has gone public with his startling hypothesis that Conficker, a notorious but still-mysterious computer worm that confounded IT managers for months in 2008 and 2009, was actually a dry run for Stuxnet, the worm that infected and apparently disabled an Iranian nuclear facility in 2010.
“Conficker was a door kicker,” John Bumgarner, a former U.S. Army and U.S. Marines officer who’s also worked at IBM and Lucent, told Reuters in a story that was posted online Friday morning (Dec. 2). “It built out an elaborate smoke screen around the whole world to mask the real operation, which was to deliver Stuxnet.”
If Bumgarner’s hypothesis is true, it would finally explain the mystery behind Conficker, which had infected perhaps 15 million PCs by early 2009. The worm built a huge botnet army of linked computers, yet never switched it on. Its authorship has never been determined, though evidence hints at Ukrainian cybercriminals.
Stuxnet is thought to have been created by U.S. and Israeli intelligence services to cripple the Iranian nuclear-fuel-processing facility at Natanz, which suffered unexplained accidents and shutdowns in the summer of 2010.
Other security researchers aren’t convinced by Bumgarner’s scenario.
“This account stretches my credulity to [the] breaking point,” said Britain-based Trend Micro researcher Rik Ferguson in a blog posting later Friday.
“Conficker/Stuxnet is quite the stretch,” tweeted Kaspersky Lab researcher and ZDNet writer Ryan Naraine on Friday.
Too many coincidences?
Bumgarner, who is now the chief technology officer for the U.S. Cyber Consequences Unit, a nonprofit think-tank that advises government agencies on cybersecurity, thinks there are too many similarities between Conficker and Stuxnet to be coincidental.
Both were highly sophisticated, both spread via USB sticks and both rapidly mutated, he said. Bumgarner also said there are overlapping dates marked in the developed code for both, as well as in Duqu, a recently discovered Trojan that many security experts think was created by the writers of Stuxnet.
Ferguson didn’t buy it.
“The levels of sophistication in Conficker and Stuxnet are in different leagues,” he countered. “Stuxnet was a far more sophisticated animal, taking advantage of zero-day vulnerabilities and requiring specialist knowledge of SCADA systems and nuclear facilities.”
Ferguson pointed out that all of Conficker’s exploits were of already-known vulnerabilities that many people simply hadn’t bothered to patch. In contrast, Stuxnet used four rare and valuable “zero-day” Windows exploits that had never before been known of, and Duqu used one.
Bumgarner also leaves out the fact that Conficker initially spread through a vulnerability in the networking component of Windows. Only later did it move on to exploiting the “instant-run” feature that automatically ran programs on USB sticks as soon as they were plugged into PCs.
Conficker was eventually defeated by a group of security and software companies that Microsoft put together in early 2009. It is now detected and destroyed by most major anti-virus software packages. Microsoft is still offering a $250,000 reward for information leading to its creators.
Nevertheless, Bumgarner told Reuters that Conficker, like Stuxnet, is a cyberweapon, not a criminal creation, and that its silent botnet may someday wake up.
“Conficker represents the largest cyberarmy in the world,” he said. “These soldiers are just waiting for their next mission.”
http://www.securitynewsdaily.com/-conficker-stuxnet-duqu-1384/
Who Isn’t!
If you’re like us, you probably hate actually ‘chasing down’ new clients.
And honestly, the ones you have to convince to buy from you aren’t the ones
you truly want. After all, amateurs convince, while professionals sort.
What you really want are the people who “get it”… those willing to exchange their
value they receive for the price they’re willing to pay.
You’re looking for motivated buyers!
If you have a motivated prospect or buyer, you don’t have to tell them why they should
buy your goods or services. You just deliver the goods, then, let them know how to pay!
With our processes, we’ll show you the best way of making that happen.
* Finding the kind of customers you seek, no matter where they are.
* How to be all over the internet in as many places as you want – all at once.
A cool little benefit of this is… you don’t even need your own website.
Are you ready?
Contact us now and we’ll get you started.
Contact for info – Subject: Get Me Clients
Just Click… admin@visionseoservice.com
.
With regard to affordable SEO services, or search engine optimization for web site ranking, 2011 will bring an entirely new set of threats designed to strip organizations of confidential information and exploit users. Leading the charge will be a series of blended threats…
First, expect Stuxnet sequels. Because it takes a substantial amount of time to develop advanced persistent threats like Stuxnet, we predict similar exploits will be carried out once or twice in 2011.
Second, companies will struggle to stay secure while covering more ground. Today’s threats continue to morph based on where/how companies do business. Blended threats (like Zeus and SpyEye) will continue to evolve and use a variety of delivery methods. Malicious content is no longer binary files delivered in attachments; it is script-based or embedded within rich media. As our previous Insights post referenced, many threats spread rapidly through social media. This is going to continue be a challenge as 13 percent of all Web traffic is going to Facebook and this number continues to increase as more businesses use social media.
While many cybercriminals are nearly 100 percent focused on stealing corporate data to make money – most IT professionals don’t have the bandwidth to personally secure every Web page and email employees use. 52 percent of data-stealing attacks were conducted over the Web and another nine percent happened over email last year.
In 2011, strained IT departments will need to defend more territory and allow more Web access, despite increasingly sophisticated threats. Cybercriminals know that legacy technology simply looks for the signature or reputation of threats that are known, which is why they are so successful at exploitation.
And finally, we anticipate malware exploit kits will add zero-day vulnerabilities faster, increasing their use in drive-by download attacks. As more targeted attacks are researched, more zero-day vulnerabilities will be discovered. Blended threats are ever-evolving and tested by cybercriminals on anti-virus before they are released. Our research also showed the prevalence of the threats currently out there. Users of the top 1,000 sites are only two clicks away from malware at any given time. And, we saw a 111.4% increase in the number of malicious websites from 2009 to 2010.
The reality is security needs to be designed for the way we do business. Data loss prevention and up-to-the-minute threat protection will become increasingly more important as organizations work to keep malicious content out and corporate information in your affordable SEO services.
To see our Websense Security Labs recap of 2010, please visit http://www.websense.com/content/threat-report-2010-introduction.aspx

Putting to rest any doubts about the importance of its mobile services apps, real estate search website Trulia found that the percentage of its online visitors — who also used its app — was as high as 46% in some cities last month. The just-released study is further evidence of the growing mobile web, which Morgan Stanley recently predicted will eclipse the desktop web by 2012.
You Can Determine How Many View Your Site
Get More Visitors – Improve Your Search Engine Visibility
Get high quality backlinks, which are not to be confused with much weaker links
The quality of your links determine how long your links last and how Google sees them.
Your website’s PageRank (PR) determines how many customers see your site.
“But, Won’t I Do Just As Well With A Lot of Any Links?”
NO! – Start building your backlink count TODAY with High PR Backlinks that really count!!
Read how one independent expert demonstrates the difference you can make on your own, between the cheap or fragile links versus the strong and ‘relevant’ links, which your site needs to be truly competitive.
Get It Here
You want to increase your backlink count so that your website will rise to the top of the Search Engines, but you don’t want to spend thousands of dollars a year paying other webmasters for links or linking services, you don’t want to clutter up your own site with irrelevant links and “bleed” what Page Rank you do have, and you don’t have time to post endlessly on forums and blogs for “backlink power”.
Testimonials
“I recently made a purchase and I’m very impressed with the quality. All backlinks aren’t created equal, so for my web site, only the best will do”
“Backlinking ‘done right’ is what matters. This is simply awesome, since I can actually see the links appear within a couple of weeks.”
(You may click and print these presentations for later use or for passing on to others)

Real-time Malicious content detection, profanity filtering, Facebook protection, URL category blocking, enhanced statistics, new and improved API and much more!
Sign Up FREE Here
Also, see Media Management Campaigns
What’s the impact of your customers seeing this image in your window?
Ask us.
Contact for info – Subject: Google Favorite Places
Just Click… leadconsultant@visionassocllc.com
.
Ask us how you can get your business and profile into a Google map profile, as we have done for our business, often within a very short time, for only a one-time, non-recurring fee.
Note – Recently, Google has enhanced the qualifications criteria for this placement. Therefore, it will require more skill to acquire and maintain this position than just six months ago, so,
don’t be left behind.
Your customers will instantly identify you and your customers, or, some by accident (“….oh – this one is just right around the corner…”) just when they’re looking for someone who does just what you do. That’s called a ‘buying signal’!!!!