The malware writers and criminals who run botnets for years have been using shared hosting platforms and so-called bulletproof hosting providers as bases of operations for their online crimes. But, as law enforcement agencies and security experts have moved to take these providers offline, the criminals have taken the next step and begun setting up their own virtual data centers.
Browsing Tag: malware
[img_assist|nid=2356|title=|desc=|link=none|align=left|width=100|height=100]The iKee worm that was infecting jailbroken iPhones last month was a simple, yet effective, piece of software that shows how easy it might be for an attacker to create a fairly large, functioning botnet comprising mobile devices, an analysis of the worm shows.
[img_assist|nid=2333|title=|desc=|link=none|align=right|width=100|height=100]Version 2.1 of the Cloud Security Alliance’s “Guidance for Critical Areas of Focus in Cloud Computing” provides more concise and actionable guidance across all
domains, and encompasses knowledge gained from real world deployments
over the past six months. Read the full article. [Help Net Security]
A Chinese court Wednesday sentenced 11 members of a malware ring for writing and distributing Read the full article. [IDG News Service]viruses meant to steal online game account passwords, according to state media.
[img_assist|nid=2331|title=|desc=|link=none|align=right|width=100|height=100]Rogue antivirus applications have been a serious threat to users for some time now, but the level of sophistication of these attacks has gone up several levels recently, as attackers have learned to copy exactly the GUI and virtually every feature of authentic AV programs.
[img_assist|nid=2330|title=|desc=|link=none|align=left|width=100|height=100]Security researchers believe changes being made by the Chinese government to the DNS process could help limit the number of malicious sites using the .cn top-level domain. Read the full article. [eWEEK]
[img_assist|nid=2328|title=|desc=|link=none|align=right|width=100|height=100]Web servers, FTP servers, and even SSL servers
are becoming prime targets for botnet operators, not as command and
control servers or as pure zombies, but more as a place to host their
malicious code and files, or in some cases to execute high-powered spam
runs. Read the full article. [Dark Reading]
[img_assist|nid=2299|title=|desc=|link=none|align=left|width=100|height=63]Stats from the one billion spam messages blocked by Project Honey Pot over the last five years provide an insight into junk mail trends and spamming practices. Read the full article. [The Register]
[img_assist|nid=2287|title=|desc=|link=none|align=left|width=100|height=100]Attackers are targeting new, unpatched flaws in both Adobe Acrobat and Adobe Reader. The vulnerabilities exist in the most recent versions of the applications and are under active attack, according to Adobe.
[img_assist|nid=2267|title=|desc=|link=none|align=right|width=100|height=100]A particular variant of the Koobface worm — dubbed Koobface.GK – initiates by posting malicious links on Facebook wall pages enticing folks to click on a cutesy Christmas video. Read the full article. [The Last Watchdog]