Please turn on your JavaScript for this page to function normally.
Zeus rival boasts of eluding tracker services, fails

Kaspersky Lab expert Jorge Mieres wrote yesterday about Ice IX – the first crimeware based on the leaked Zeus source code. “Ice IX Botnet is the first new …

Internet bad neighborhoods

A significant part of current attacks on the Internet comes from compromised hosts that, usually, take part in botnets. Even though bots themselves can be distributed all over …

Global analysis of 10 million web attacks

Web applications, on average, experience twenty seven attacks per hour, or roughly one attack every two minutes, according to Imperva. They observed and categorized attacks …

DDoS bot masquerades as Java update

An especially virulent Trojan variant with DDoS capabilities has been spotted masquerading as a regular Java update and is being served both from legitimate and malicious …

Microsoft offers $250,000 reward for botnet information

Microsoft decided to extend their efforts to establish the identity of those responsible for controlling the Rustock botnet by issuing a $250,000 reward for new information …

Spammers switch to compromised accounts, shift away from botnets

Spammers today favor compromised accounts for sending spam, gradually shifting distribution away from botnets, according to Commtouch. The changed tactic has emerged as spam …

An examination of malware ecosystems

Malware delivery networks are typically hosted across multiple sites and are responsible for launching dynamic attacks on unsuspecting users. A new Blue Coat report examines …

The malware behind an “indestructible” botnet

It took only three months for the TDL rootkit – also known as Tidserv, TDSS and Alureon – to add over 4,5 million infected computers to the developers’ …

Increase in stolen digital certificates used to sign malware

A report unearths how “trusted malware” is continuing to grow at an alarming rate. In Q2, AVG has seen an increase in the number of stolen digital certificates …

Malware activity hitting peaks of 10 million pieces per day

Virus and malware activity increased during the month of May, sporadically hitting peaks of more than 10 million pieces per day, according to AppRiver. Major news events, once …

Rustock still down, Microsoft pursues the botherders

Microsoft believes that the individuals behind the (still crippled) Rustock botnets are located in Russia, so it placed advertisements in the The Moscow News and the Delovoy …

The most active first quarter in malware history

With six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history, according to McAfee. The report revealed many of the trends …

Don't miss

Cybersecurity news