Zeus rival boasts of eluding tracker services, fails
Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …
Internet bad neighborhoods
A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over …
Global analysis of 10 million web attacks
Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to Imperva. They observed and categorized attacks …
DDoS bot masquerades as Java update
An especially virulent Trojan variant with DDoS capabilities has been spotted masquerading as a regular Java update and is being served both from legitimate and malicious …
Microsoft offers $250,000 reward for botnet information
Microsoft decided to extend their efforts to establish the identity of those responsible for controlling the Rustock botnet by issuing a $250,000 reward for new information …
Spammers switch to compromised accounts, shift away from botnets
Spammers today favor compromised accounts for sending spam, gradually shifting distribution away from botnets, according to Commtouch. The changed tactic has emerged as spam …
An examination of malware ecosystems
Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …
The malware behind an “indestructible” botnet
It took only three months for the TDL rootkit – also known as Tidserv, TDSS and Alureon – to add over 4,5 million infected computers to the developers’ …
Increase in stolen digital certificates used to sign malware
A report unearths how “trusted malware” is continuing to grow at an alarming rate. In Q2, AVG has seen an increase in the number of stolen digital certificates …
Malware activity hitting peaks of 10 million pieces per day
Virus and malware activity increased during the month of May, sporadically hitting peaks of more than 10 million pieces per day, according to AppRiver. Major news events, once …
Rustock still down, Microsoft pursues the botherders
Microsoft believes that the individuals behind the (still crippled) Rustock botnets are located in Russia, so it placed advertisements in the The Moscow News and the Delovoy …
The most active first quarter in malware history
With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history, according to McAfee. The report revealed many of the trends …
Featured news
Sponsored
Don't miss
- Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware!
- LastPass users targeted by vishing attackers
- Protobom: Open-source software supply chain tool
- The key pillars of domain security
- Ivanti patches critical Avalanche flaw exploitable via a simple message (CVE-2024-29204)