Please turn on your JavaScript for this page to function normally.
Rustock botnet downed by Microsoft

As many security companies and experts noted in the last few days, the activities of the Rustock botnet came to a standstill. They speculated about the reason behind this …

Tough questions about botnets

ENISA published a comprehensive study on the botnet threat and how to address it. The report looks at the reliability of botnet size estimates and makes recommendations for …

SpyEye botnet activity surges

Fortinet announced its February 2011 Threat Landscape report, which details five zero-day vulnerabilities found in Cisco (FGA-2011-03), Adobe (FGA-2011-06) and Microsoft …

Malware family integration across botnets

Analysis by Symantec reveals that in February, 1 in 290.1 emails (0.345%) was malicious making February among the most prolific time periods both in terms of simultaneous …

Attackers take advantage of emerging technologies

Attackers continue to focus on social engineering attacks and circumventing legacy enterprise security systems, according to Zscaler. Q4 saw shifts in the sources of …

Top 10 botnets of 2010

Damballa’s “Top 10 Botnet Threat Report – 2010” shows a dramatic increase in Internet crime and targeted botnet attacks. At its peak in 2010, the total …

Complex Trojans and next generation malware is on the way

While e-mail users may have noticed a significant drop in spam in recent months, cybercriminals are gaining ground with creative new phishing methods and making exploit kits …

Web malware grew by 139 percent

Cisco’s latest global threat report reveals that Web malware increased by 139 percent in 2010 compared with the previous year. The rate of Web malware encounters peaked …

Malware increases by 46% in only one year

There is a steady growth of threats to mobile platforms, according to a new McAfee report. The number of pieces of new mobile malware in 2010 increased by 46 percent compared …

Zeus evolution: Geographical attack locations

Despite having been around for four years, Zeus continues to be a thorn in the side of the IT security industry and its business users, mainly because of its constantly …

500,000 stolen e-mail credentials for Waledac’s comeback

Almost a year ago, the Waledac botnet was crippled by a legal action initiated by Microsoft which resulted in the takedown of 273 Internet domains that were being used as …

Inside a banking Trojan drop-zone

There can be no doubt that cybercrime is on the rise. Compared to real-world crime, it is easier, often more profitable, and carries definitely less risk to the perpetrator. …

Don't miss

Cybersecurity news