Blog Posts Tagged with "botnet"
December 10, 2012 Added by:Pierluigi Paganini
In September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet Relay Chat (IRC) server running as a hidden service of the Tor...
July 19, 2012 Added by:Headlines
“The concern with ZeroAccess is that it is using the subscriber’s bandwidth maliciously which will cost them money as they exceed bandwidth caps. And, once the computer is compromised, it can also spread additional malware or launch new attacks... while connecting to over one million computers globally..."
July 09, 2012 Added by:Pierluigi Paganini
Despite the calls to check for infected units provided by the press and law enforcement, too many PCs are still infected and potentially vulnerable to the planned blackout. The estimation is that 64,000 users in the United States, plus an additional 200,000 users outside the United States are still at risk...
June 14, 2012 Added by:Headlines
The indictment alleges that Ryan Cleary controlled a large botnet of potentially hundreds of thousands of units to conduct DDoS attacks and would rent out his botnet for certain time periods in exchange for money from individuals interested in conducting DDoS attacks targeting specific victims...
May 17, 2012 Added by:Headlines
"Utilizing less than 2% of the entire botnet the attackers were able to generate $14,000 in three weeks, meaning that if the attackers were able to use the entire botnet, they could potentially have earned millions of dollars a year..."
March 26, 2012 Added by:Headlines
"With this legal and technical action, a number of the most harmful botnets using the Zeus family of malware worldwide have been disrupted in an unprecedented, proactive cross-industry operation against this cybercriminal organization..."
March 19, 2012 Added by:Kevin McAleavey
"Apache Killer" exploits a vulnerability in the server by sending a specially crafted Range HTTP header to trigger a denial-of-service condition, and a single computer is capable of bringing Apache to its knees. A botnet full of these can result in "tango down"...
March 06, 2012 Added by:Pierluigi Paganini
For several months, news was circulating about the planned blackout of the Internet for potentially millions of users on March 8. Last week a federal judge postponed that order for 120 days to give businesses and governments more time to mitigate the DNSChanger threat...
August 23, 2011 Added by:Headlines
"Many think of DDoS as a computer network such as a bot network of rogue or infected machines which carry out the orders of whoever controls them. In the case of this specific code, Anonymous only needed to control a single system to begin the attack. The rest is carried out by unwitting accomplices..."
May 06, 2011 Added by:Headlines
Multi-platform malware is not entirely new, but with the increasing popularity of Apple products in the marketplace, there is an incentive for malware authors to save time and resources by developing strains that are capable of infecting multiple operating systems...
April 14, 2011 Added by:Jared Carstensen
The so called "massive fraud scheme" utilized software called Coreflood - which collected and stored system and application passwords, along with other financial information. The use of Coreflood was enabled by a Windows OS vulnerability which then allowed the botnet to spread rapidly...
April 13, 2011 Added by:Headlines
The first quarter of 2011 was also witness to a broad range of attempts to distribute malware, and increased malware levels overall. These attempts included malware sent through Facebook chat, or which used other wellknown brand-names such as T-Online and Xerox...
March 08, 2011 Added by:Scot Terban
Truly, we are seeing the next generation of early digital warfare at this scale. I expect that in the near future we will see more nastiness surface, and I think it highly likely in the post Stuxnet world, that all of the players are now thinking in much more complex terms on attacks and defenses...
February 23, 2011 Added by:Dan Dieterle
In normal operation, the BGP protocol helps keep the internet up and running. If a router goes down, Routers update the missing link and go around it. But if these routers are attacked on purpose and flooded with updates, it could put the internet into a state where it could not recover...
February 06, 2011 Added by:Robert Siciliano
On Super Sunday weekend much of the scamming taking place is designed to separate the public from their money using the Big Game as the lure. People are seeking information on the Game and are being tackled by criminals who steal the ball...
January 03, 2011 Added by:Dan Dieterle
Geinimi is capable of receiving commands from remote servers controlled by hackers, this botnet-style functionality together with the use of code obfuscation techniques leads mobile security firm Lookout to describe the malware as the most sophisticated to appear on Android devices to date...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013