IDG News Service - One of the world's most active spam botnets -- Grum -- was crippled after two of its command and control (CnC) servers hosted in the Netherlands were taken down, according to researchers from security firm FireEye. ...
Tags: spam botnets, Netherlands, FireEye, security
McAfee is expanding its mobile security software for Android tablets and smartphones, as it sees an increase in threats targeting Android devices, the Intel subsidiary announced on Monday. The new Mobile Security software has features ...
Tags: McAfee, mobile security software, Android, tablets, smartphones
IDG News Service - Google on Thursday dismissed the possibility that a new wave of pharmacy, penny stock and e-card spam emails are being sent by Android spam botnets. "Our analysis suggests that spammers are using infected computers and ...
Tags: Google, pharmacy, penny stock, spam email, computers
Medical devices often use commercial PCs and have wireless connections that make them vulnerable to malware, or require software updates for security, but the U.S. may not be doing an adequate job tracking these risks, researchers ...
Tags: Medical-Device Security, security IT, malware, computer technology
A 30-year-old Phoenix man was sentenced Thursday to 30 months in prison for using botnets and selling access to them, the U.S. Department of Justice announced. Joshua Schichtel, allegedly connected to a group of hackers who used ...
Tags: Phoenix man, botnets, U.S.Department of Justice, Arizona
Facebook has begun warning users whose computers are infected with the DNSChanger malware, a variant of the Zlob family of Trojans. The malware is designed to tell the infected computer to use a rogue Domain Name System (DNS) server, ...
Tags: Facebookm, computer security, DNSChanger malware, Trojans
Threat data Future of hardware-assisted security Why Intel bought McAfee Defence in isolation and containment Social media, cloud, big data and mobile apps Video: McAfee co-president Michael DeCesare on consumerisation and security The ...
Tags: hardware-assisted security, Intel, McAfee Defence, Social media, cloud
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May. He was arrested in Stoke-on-Trent for questioning under the Serious Crime Act on suspicion of assisting or ...
Tags: DDoS, Theresa May, website, Home Office website
The wave of cyberattacks against a half-dozen U.S. financial institutions has subsided this week, but the recent demonstration of force shows a careful honing of destructive techniques that could continue to cause headaches. The attacks ...
Tags: cyberattacks, financial institutions, could, banking websites
Security researcher Michael Coppola demonstrated how small and home office (SOHO) routers can be compromised and turned into botnet clients by updating them with backdoored versions of vendor-supplied firmware. Coppola, who is a security ...
Tags: SOHO routers, botnet clients, backdoored versions, firmware
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge ...
Tags: spammers, a mobile spam campaign, spam messages, Android
Cybercriminals no longer control one of the world's largest spam botnets, Grum, because all of the servers the botnet relied on for receiving commands were shut down, according to researchers from security firm FireEye. The last Grum ...
Tags: Cybercriminals, spam botnets, Grum, servers
A growing army of malware delivery networks, known as malnets, account for two thirds of all cyber attacks, and security firm Blue Coat claims most current technologies offer an inadequate response to the threat, according to new analysis. ...
Tags: Blue Coat, botnet, cyber attack, Malnet, malware
Cyber criminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. Three months ...
Tags: Black Market, malware, Proxy, Symantec, Computers
When malware infects a machine it usually goes after the system software. But in a rare case worked on by SpiderLabs, researchers found a Trojan that had been infected by a virus, leaving both still functioning as normal. The two pieces ...
Tags: malware, system software, SpiderLabs, Trojan, virus