[img_assist|nid=4125|title=|desc=|link=none|align=left|width=100|height=100]One year after the Conficker botnet was front-page news around the world, the U.S. Department of Homeland Security is preparing a report looking at the worldwide effort to keep it in check.The report, to be published within the month, shows how an ad hoc group of security researchers and Internet infrastructure providers banded together into an organization they called the Conficker Working Group. Its goal was to address what was at the time the world’s most serious cyberthreat. Read the full story [IDG News Service]
Browsing Tag: malware
This video features a detailed demonstration of a technique for reproducing the Aurora Internet Explorer exploit using the Metasploit Framework.
[img_assist|nid=4098|title=|desc=|link=none|align=left|width=100|height=100]By Gunter Ollmann, DamballaLast night my attention was drawn to a couple of blog entries
relating to Google and the attacks they fell victim to earlier this
year. These attacks were eventually labeled as “Operation Aurora” by
McAfee (based upon the presence of the “aurora” keyword embedded within
some of the malware).
[img_assist|nid=4080|title=|desc=|link=none|align=left|width=100|height=100]The percentage of Internet users in China with no security software was 4.4% last year,a up from 3.9% the previous year, according to recent survey results by the China Internet Network Information Center (CNNIC) and China’s National Computer Network Emergency Response Technical Team (CNCERT). Read the full article. [Comptuerworld]
[img_assist|nid=4035|title=|desc=|link=none|align=right|width=100|height=100]Spammers and malware writers have wasted no time in taking advantage of Monday’s bombings in Moscow, opening up a campaign on Twitter to point users to malicious sites.
[img_assist|nid=4019|title=|desc=|link=none|align=right|width=87|height=100]Researchers are reporting on an ongoing targeted malware campaign using a FIFA World Cup 2010 theme, in an attempt to trick end users into executing a malicious PDF file, exploiting a recently patched flaw in Adobe Reader. Read the full article. [ZDNet]
Internet service providers have the ability to wipe nearly all malicious activity in their network without stepping on individual privacy and civil liberties, said Adam Rice, chief security officer at Mumbai-based Tata Communications. Read the full article. [TechTarget]
[img_assist|nid=3834|title=|desc=|link=none|align=left|width=100|height=100]The authors of the Zeus bot client, perhaps the most popular and pervasive piece of malware of its kind right now, have taken an extraordinary step to protect their creation: inserting a hardware-based licensing scheme into the Trojan. This represents a significant leap in the sophistication and professionalism of malware development, researchers say.
[img_assist|nid=3807|title=|desc=|link=none|align=left|width=100|height=100]Criminals increasingly attempt to camouflage the traces of their malware on the internet to keep control of a hijacked server for as long as possible. However, their paths can be retraced using special tools to identify the vulnerability the malware intends to exploit to enter a system. Read the full article. [The H Security]
[img_assist|nid=3766|title=|desc=|link=none|align=left|width=100|height=100]The latest version of the Zeus do-it-yourself crimeware kit goes to
great lengths to thwart would-be pirates by introducing a
hardware-based product activation scheme similar to what’s found in
Microsoft Windows. Read the full article. [The Register]