Software vendors Microsoft and Symantec have "taken down" the Bamital botnet following a joint investigation lasting more than three years. The operation involved shutting down servers that were being used to control hundreds of thousands ...
Tags: Microsoft, Symantec, joint investigation
In a security landscape report released on Tuesday, security software maker F-Secure claimed that 2012 was the "year of the exploit". F-Secure, which focused on cyber threats during the second half of 2012, noted that the Internet has ...
Tags: security software, Internet, Web
The European Commission’s latest cyber security strategy has been slammed by a member of the European Parliament, who accused the strategy of being “incoherent and lacking in focus” on Thursday. The Cyber Security ...
Tags: Politician, EU, Cyber Security Strategy
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions -- thought by some to be the work of Iran -- ...
Tags: U.S.banks, junk traffic, DDoS attack campaign, U.S.financial institutions
Evidence collected from a website that was recently used to flood U.S. banks with junk traffic suggests that the people behind the ongoing DDoS attack campaign against U.S. financial institutions — thought by some to be the work of ...
Tags: bank attacks, botnets for hire, cyber attacks, Homeland Security, Iran
Some cloud providers fail to detect and block malicious traffic originating from their networks, which provides cybercriminals with an opportunity to launch attacks in a botnet-like fashion, according to a report from Australian security ...
Tags: cloud providers, botnets, cybercriminals, malicious traffic
Security researchers have identified a botnet controlled by its creators over the Tor anonymity network. It's likely that other botnet operators will adopt this approach, according to the team from vulnerability assessment and penetration ...
Tags: Security researcher, botnet, Tor network, DDoS
U.S. law enforcement agencies with the help of Facebook have arrested 10 people from various countries in connection with international cybercrime rings that targeted users on the social network. The operation is said to have identified ...
20,000 PCs in the UK could be cut off from the web on Monday 9 July 2012, as a consequence of the DNS Changer virus. Infected machines will no longer be able to access websites, e-mail, chat or social networking sites such as Facebook, ...
Tags: UK, computer, DNS Changer virus, networking site, cyber security
In a new twist, spammers have built a botnet that sends SMS spam through infected Android phones, shifting the potentially pricey cost of sending spam to victims. The trend, spotted by security vendor Cloudmark, poses a new challenge for ...
Tags: botnet, SMS spam, Android phones, victims
An increase in hacktivism and a greater prevalence of Advanced Evasion Techniques will form part of the backdrop of IT security in 2013, according to Stonesoft With 2013 just around the corner, it is time for IT security experts to reflect ...
Tags: Stonesoft, cyber threats, Evasion Techniques, IT security
Malware attacks seem to be evolving. The traditional viruses, Trojan horses, botnets and phishing attacks are still a threat, but the next generation malware takes insidious to a whole new level. Thankfully, theres a silver lining as well. ...
Tags: Malware, attacks, traditional viruses, Trojan horses, botnets
The second quarter of 2012 saw the biggest increase in malware samples detected in the past four years, says security firm McAfee. Researchers detected a 1.5 million sample increase in malware since Q1 2012, according to the firm’s ...
Tags: McAfee, malware spike, Computer Products
Security researchers have collaborated to take down Grum, the world's third-largest botnet of hijacked computers. The Grum botnet is believed to have been responsible for around 18% of global spam, or 18 billion spam messages a day. ...
Tags: Security Researchers, Grum, hijacked computers, global spam, spam messages
IDG News Service - Cybercriminals are using computers infected with a particular piece of malware to power a commercial proxy service that funnels potentially malicious traffic through them, according to security researchers from Symantec. ...
Tags: Cybercriminals, computer, malware, commercial proxy service