[img_assist|nid=4035|title=|desc=|link=none|align=right|width=100|height=100]Spammers and malware writers have wasted no time in taking advantage of Monday’s bombings in Moscow, opening up a campaign on Twitter to point users to malicious sites.
Browsing Tag: malware
[img_assist|nid=4019|title=|desc=|link=none|align=right|width=87|height=100]Researchers are reporting on an ongoing targeted malware campaign using a FIFA World Cup 2010 theme, in an attempt to trick end users into executing a malicious PDF file, exploiting a recently patched flaw in Adobe Reader. Read the full article. [ZDNet]
Internet service providers have the ability to wipe nearly all malicious activity in their network without stepping on individual privacy and civil liberties, said Adam Rice, chief security officer at Mumbai-based Tata Communications. Read the full article. [TechTarget]
[img_assist|nid=3834|title=|desc=|link=none|align=left|width=100|height=100]The authors of the Zeus bot client, perhaps the most popular and pervasive piece of malware of its kind right now, have taken an extraordinary step to protect their creation: inserting a hardware-based licensing scheme into the Trojan. This represents a significant leap in the sophistication and professionalism of malware development, researchers say.
[img_assist|nid=3807|title=|desc=|link=none|align=left|width=100|height=100]Criminals increasingly attempt to camouflage the traces of their malware on the internet to keep control of a hijacked server for as long as possible. However, their paths can be retraced using special tools to identify the vulnerability the malware intends to exploit to enter a system. Read the full article. [The H Security]
[img_assist|nid=3766|title=|desc=|link=none|align=left|width=100|height=100]The latest version of the Zeus do-it-yourself crimeware kit goes to
great lengths to thwart would-be pirates by introducing a
hardware-based product activation scheme similar to what’s found in
Microsoft Windows. Read the full article. [The Register]
Reported losses from online fraud more than doubled last year, from $265 million in 2008 to nearly $560 million in 2009, according to figures released Friday by the FBI. Read the full article. [KrebsonSecurity]
[img_assist|nid=3785|title=|desc=|link=none|align=right|width=117|height=83]A lot of people in the security industry are paid to think like attackers: pen testers, security consultants, software security experts. But some of these people have never met an actual black hat, so much of their work is necessarily based on what they think attackers might do in a given situation.
Dennis Fisher talks with Marc Maiffret of FireEye at RSA Conference 2010 about the lack of sophistication in the Aurora attack and the state of malware attacks on the Web.
[img_assist|nid=3766|title=|desc=|link=none|align=right|width=100|height=100]The takedown of 100 servers used to control Zeus-related botnets may
be a short-lived victory, security researchers said after discovering
that about a third of the orphaned channels were able to regain
connectivity in less than 48 hours. The resurrection of at least 30 command and control channels came
after their ISP found a new upstream provider to
provide connectivity to the outside world, autonomous system records
showed. Read the full article. [The Register]