Browsing Tag: malware

Categories: Malware

The malware writers and criminals who run botnets for years have been using shared hosting platforms and so-called bulletproof hosting providers as bases of operations for their online crimes. But, as law enforcement agencies and security experts have moved to take these providers offline, the criminals have taken the next step and begun setting up their own virtual data centers.

Read more...

Categories: Malware

[img_assist|nid=2356|title=|desc=|link=none|align=left|width=100|height=100]The iKee worm that was infecting jailbroken iPhones last month was a simple, yet effective, piece of software that shows how easy it might be for an attacker to create a fairly large, functioning botnet comprising mobile devices, an analysis of the worm shows.

Read more...

[img_assist|nid=2333|title=|desc=|link=none|align=right|width=100|height=100]Version 2.1 of the Cloud Security Alliance’s “Guidance for Critical Areas of Focus in Cloud Computing” provides more concise and actionable guidance across all
domains, and encompasses knowledge gained from real world deployments
over the past six months. Read the full article. [Help Net Security]

Read more...

Categories: Malware

[img_assist|nid=2331|title=|desc=|link=none|align=right|width=100|height=100]Rogue antivirus applications have been a serious threat to users for some time now, but the level of sophistication of these attacks has gone up several levels recently, as attackers have learned to copy exactly the GUI and virtually every feature of authentic AV programs.

Read more...

[img_assist|nid=2328|title=|desc=|link=none|align=right|width=100|height=100]Web servers, FTP servers, and even SSL servers
are becoming prime targets for botnet operators, not as command and
control servers or as pure zombies, but more as a place to host their
malicious code and files, or in some cases to execute high-powered spam
runs. Read the full article. [Dark Reading]

Read more...