Browsing Tag: malware

[img_assist|nid=4125|title=|desc=|link=none|align=left|width=100|height=100]One year after the Conficker botnet was front-page news around the world, the U.S. Department of Homeland Security is preparing a report looking at the worldwide effort to keep it in check.The report, to be published within the month, shows how an ad hoc group of security researchers and Internet infrastructure providers banded together into an organization they called the Conficker Working Group. Its goal was to address what was at the time the world’s most serious cyberthreat.  Read the full story [IDG News Service]

Read more...

Categories: Malware

[img_assist|nid=4098|title=|desc=|link=none|align=left|width=100|height=100]By Gunter Ollmann, DamballaLast night my attention was drawn to a couple of blog entries
relating to Google and the attacks they fell victim to earlier this
year. These attacks were eventually labeled as “Operation Aurora” by
McAfee (based upon the presence of the “aurora” keyword embedded within
some of the malware).

Read more...

[img_assist|nid=4080|title=|desc=|link=none|align=left|width=100|height=100]The percentage of Internet users in China with no security software was 4.4% last year,a up from 3.9% the previous year, according to recent survey results by the China Internet Network Information Center (CNNIC) and China’s National Computer Network Emergency Response Technical Team (CNCERT). Read the full article. [Comptuerworld]

Read more...

Categories: Malware, Web Security

[img_assist|nid=4019|title=|desc=|link=none|align=right|width=87|height=100]Researchers are reporting on an ongoing targeted malware campaign using a FIFA World Cup 2010 theme, in an attempt to trick end users into executing a malicious PDF file, exploiting a recently patched flaw in Adobe Reader. Read the full article. [ZDNet]

Read more...

Categories: Malware

[img_assist|nid=3834|title=|desc=|link=none|align=left|width=100|height=100]The authors of the Zeus bot client, perhaps the most popular and pervasive piece of malware of its kind right now, have taken an extraordinary step to protect their creation: inserting a hardware-based licensing scheme into the Trojan. This represents a significant leap in the sophistication and professionalism of malware development, researchers say.

Read more...

[img_assist|nid=3807|title=|desc=|link=none|align=left|width=100|height=100]Criminals increasingly attempt to camouflage the traces of their malware on the internet to keep control of a hijacked server for as long as possible. However, their paths can be retraced using special tools to identify the vulnerability the malware intends to exploit to enter a system. Read the full article. [The H Security]

Read more...