Waledac botnet wakes up after 7 days of sleep
Waledac appeared in a new version in the last days of 2010, sending out big amounts of New Year related spam messages. It then stopped spamming in the evening of January 4th, …
38 billion spam e-mails: A sign of things to come?
Over the last twelve months, AppRiver quarantined more than 38 billion spam messages, almost double the amount quarantined just two years ago. Of that total, 450 million …
Week in review: Phishing, Kneber botnet and Microsoft vulnerabilities
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Adobe PDF format riddled with exploitable features Adobe’s PDF …
Kneber botnet returns, steals sensitive government documents
The Kneber botnet is running and striking again – this time with a Christmas-themed electronic greeting card seemingly coming from The White House and targeting …
Experimental botnet reveals long sought answers
Is there a better way of analyzing the ins and outs of a botnet than making one yourself? The answer to that question was negative for ESET’s researcher Pierre-Marc …
Scottish botnet master sentenced
Matthew Anderson – the Scottish botnet master who was found guilty of organizing a campaign that saw computers enslaved in a botnet, stealing data from their owners and …
The aftermath of the Bredolab botnet shutdown
The war against botnets will be long and hard – there is no doubt about it. For one thing, command and control centers can be replaced and the targeted botnet …
Week in review: Mac OS X Trojan, Bredolab shutdown and Firefox add-on for hijacking online accounts
Here’s an overview of some of last week’s most interesting news, articles and interviews: Firefox extension makes social network ID spoofing trivial “When it …
Are computer “health certificates” the answer for the botnet problem?
Back in March, at the RSA Conference in San Francisco, Corporate Vice President for Trustworthy Computing at Microsoft Scott Charney proposed to the audience and to the world …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity