Blog Posts Tagged with "Botnets"
September 16, 2012 Added by:Pierluigi Paganini
Cybercriminals are exploiting a new way to spread malware by preloading malicious code inside counterfeit software deployed in computers that are offered for sale. To give you an idea of the phenomenon, 20% of the PCs researchers bought from an unsecure supply chain were infected with malware...
September 06, 2012 Added by:Bill Gerneglia
The report found that the majority of employee’s devices did not have any form of security software loaded nor were company materials protected. The new report provides detailed assessments of the mobile security threat and the growing market for security solutions...
July 18, 2012 Added by:Headlines
“Q2 data showed a return to traditional infrastructure attacks and is likely a reflection of changing tools for launching DDoS attacks. With Layer 7 attacks, the risk of detection and eventual take down by law enforcement increases because these attacks disclose the IP address of the attacking botnet..."
July 02, 2012 Added by:Headlines
"With no human participation required, each attack moves quickly and scales neatly.This operation combines an insider level of understanding of banking transaction systems with both custom and off the shelf malicious code and appears to be worthy of the term 'organized crime,'" the report states...
June 28, 2012 Added by:Headlines
"When a virtualized environment detected, unlike many other Trojans that stop to work, Citadel will continue to operate... It will generate a unique-machine dependent domain name (obviously fake) and tries to connect to this server (unsuccessfully), making it to believe that the bot is dead..."
June 26, 2012 Added by:Pierluigi Paganini
Cybercrime is operating as an enterprise, with tools offered for the coordination of cyber attacks such as spamming of malware, malware hosting, and for building command and control infrastructure for botnets. The latest service is called CapFire4, and it’s a good example of malware-as-a-service...
June 26, 2012 Added by:Headlines
"The criminal activities were committed by a 22-year-old young man who is widely known in the hacker community under the nicknames of 'Germes' and 'Arashi'. The young man was not only developing bot-networks and massively distributing malicious programs but also personally took part in stealing funds"...
June 20, 2012 Added by:Wendy Nather
Does having one machine on a botnet at some point automatically mean that more nefarious things are going on besides just selling V1agr4 or perhaps DDoSing the Anonymous target of the week? This is the risk calculation that we need more data to perform, and it's one that the C-suite would really appreciate...
June 18, 2012 Added by:Pierluigi Paganini
"Every peer in the botnet can act as a C&C server, while none of them really are one. Bots are now capable of downloading commands, configuration files, and executable from other bots -- every compromised computer is capable of providing data to the other bots..."
June 01, 2012 Added by:Headlines
"Results can only be achieved through a commitment of resources by both the public and private sector to aid in the detection, prevention, remediation and recovery from these threats and by users adhering to safe computing practices..."
May 31, 2012 Added by:Headlines
One in 10 computers in the U.S. is infected by a botnet used and used as a bases to execute criminal or espionage actions on behalf of remote operators Botnets can make private and financial information available to hackers, harm computers, and turn consumers into unwitting disseminators of spam emails...
May 23, 2012 Added by:Beau Woods
Two malware families show that authors have incorporated many sophisticated features to help circumvent detection and frustrate researchers attempting to study the samples, among other things. And their analysis showed that mobile malware is rapidly maturing...
May 16, 2012 Added by:Infosec Island Admin
NIST seeks to engage all stakeholders to identify the available and needed technologies and tools to recognize, prevent, and remediate botnets; explore current and future efforts to develop botnet metrics and methodologies for measuring and reporting botnet metrics over time...
May 04, 2012 Added by:Headlines
"Google began alerting the registrants of more than three dozen Gmail accounts that were the subject of Microsoft’s subpoenas... The email addresses were already named in Microsoft’s initial complaint posted at zeuslegalnotice.com, which listed nicknames and other information..."
May 01, 2012 Added by:Headlines
Researchers, who successfully tool over C&C servers, noted that nearly two out of three infected systems are running Snow Leopard OS X 10.6 which included Java preinstalled. Less vulnerable are systems running Lion OS X 10.7, unless users manually downloaded Java after purchase...
April 27, 2012 Added by:Robert Siciliano
Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013