Please turn on your JavaScript for this page to function normally.
Vulnerable and aggressive adware threatening millions

FireEye discovered a new mobile threat from a popular ad library that no other antivirus or security vendor has reported publicly before. Mobile ad libraries are third-party …

Technology eliminates bot-infected traffic from advertising campaigns

White Ops introduced a systematic solution for eliminating bot-infected traffic from advertising campaigns. “We have spent over a year tracking the bad guys attacking …

Researchers sinkhole half a million ZeroAccess bots

In a race against time and ZeroAccess developers and botmasters, Symantec researchers managed to sinkhole a large chunk of the infamous P2P-based botnet before its herders …

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it …

Researchers discover ties between TDSS and ZeroAccess rootkit families

A lot has been said and written about the long-lasting TDSS (or TDL) and the considerably newer ZeroAccess (or Sirefef) rootkits, and the similarities between the two have …

Massive spike of Tor users caused by Mevade botnet

When Project Tor director Roger Dingledine recently drew the public’s attention to the unusual and considerable rise in the number of Tor users, he invited people to …

Obad Android Trojan distributed via mobile botnets

When first unearthed three months ago, the Obad Android Trojan has fascinated researchers with its sophistication. Difficult to analyze, using a bug in the Android OS to …

Sykipot-wielding attackers now targeting US civil aviation firms

The Sykipot backdoor Trojan is not a new threat. First detected over six years ago, its existence and use has been tied almost exclusively with the cyber espionage activities …

Kelihos botnet: What victims can expect

Kelihos is a botnet which utilizes P2P communication to maintain its CnC Network. With all of the attention around Kelihos, it should be no surprise that 30/45 AV vendors are …

ZeroAccess developers continue to innovate

A while ago a group of researchers has analyzed and tested the resilience of P2P botnets, and has discovered that while Zeus and Sality botnets are highly resilient to …

Analyzing the Fort Disco bruteforce campaign

In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems. Arbor ASERT has …

Security complexity and internal breaches are key concerns

Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses. 64% of respondents to a Check …

Don't miss

Cybersecurity news