Browsing Tag: malware

[img_assist|nid=2897|title=|desc=|link=none|align=left|width=100|height=100]Popular technology site TechCrunch was hit by potty-mouth hackers late on Monday, leaving the site temporarily unavailable.

A notice on TechCrunch.com’s front page on Tuesday morning explains that “TechCrunch.com was compromised by a security exploit”. Read the full article. [The Register]

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=2893|title=|desc=|link=none|align=right|width=100|height=100]Having mastered the art of poisoning search engine results for .com sites, attackers are now turning their attention to .edu sites, linking their keyword campaigns to educational institutions as a way of lending their malicious sites more credence in the eyes of Google.

Read more...

Categories: Malware

[img_assist|nid=2854|title=|desc=|link=none|align=right|width=100|height=100]By Atif Mushtaq, FireEyeIt’s very rare that we researchers get
a chance to explore the inner workings of a botnet command and control
server.  Detailed insight into the botnet server or command component
can give us valuable information about the motives of the botnet and
possibly the bad guys behind it. But granting access to these command
and control servers often depends on the will of the hosting providers.
So what happened in this case?

Read more...

Categories: Malware

[img_assist|nid=2853|title=|desc=|link=none|align=left|width=100|height=100]Two of the seven directory authority servers that the Tor Project uses to run its anonymous browsing service have been compromised, along with a new server that the project uses to host metrics and graphs.

Read more...

Categories: Malware

Security researchers are continuing to delve into the details of the malware that’s been used in the attacks against Google, Adobe and other large companies, and they’re finding a complex package of programs that use custom protocols and sophisticated infection techniques.

Read more...

Categories: Malware, Vulnerabilities

[img_assist|nid=2662|title=|desc=|link=none|align=left|width=100|height=100]The attack that compromised Google’s corporate network and the systems of more than 30 other companies in recent weeks appears to be the work of smart, careful and very well-informed attackers who knew exactly whom to target and what to take once they were inside, security experts  say.

Read more...

Categories: Malware

[img_assist|nid=2597|title=|desc=|link=none|align=right|width=100|height=100]In the world of botnets and denial-of-service attacks, 2009 was a very interesting year. While a handful of large, noisy botnets got most of the attention, there were thousands of serious, prolonged DDoS attacks that not only chewed up huge amounts of bandwidth but likely caused major problems for the targeted organizations.

Read more...

[img_assist|nid=2593|title=|desc=|link=none|align=left|width=100|height=100]A false rumor suggesting that Facebook is to start charging is being used to bait malware traps.Thousands of disgruntled users, angry at the false claims that a $4.99 a month charge
for using the social networking site that will supposedly kick in have been induced to
visit “protest group” sites in response to spam emails. Read the full article. [The Register]

Read more...