Reported losses from online fraud more than doubled last year, from $265 million in 2008 to nearly $560 million in 2009, according to figures released Friday by the FBI. Read the full article. [KrebsonSecurity]
Browsing Tag: malware
[img_assist|nid=3785|title=|desc=|link=none|align=right|width=117|height=83]A lot of people in the security industry are paid to think like attackers: pen testers, security consultants, software security experts. But some of these people have never met an actual black hat, so much of their work is necessarily based on what they think attackers might do in a given situation.
Dennis Fisher talks with Marc Maiffret of FireEye at RSA Conference 2010 about the lack of sophistication in the Aurora attack and the state of malware attacks on the Web.
[img_assist|nid=3766|title=|desc=|link=none|align=right|width=100|height=100]The takedown of 100 servers used to control Zeus-related botnets may
be a short-lived victory, security researchers said after discovering
that about a third of the orphaned channels were able to regain
connectivity in less than 48 hours. The resurrection of at least 30 command and control channels came
after their ISP found a new upstream provider to
provide connectivity to the outside world, autonomous system records
showed. Read the full article. [The Register]
[img_assist|nid=3736|title=|desc=|link=none|align=left|width=100|height=100]By Stefan TanaseYesterday’s shut down of Troyak-as was definitely good news for the whole IT security community. Seeing cybercriminals getting kicked out from the Internet and then trying to get back inside calls for popcorn and soda.But unfortunately, as some botnets struggle, others stay unaffected: Koobface, for example, which uses compromised legitimate websites as proxies for their main command and control server.
[img_assist|nid=3703|title=|desc=|link=none|align=left|width=100|height=100]For the second time in less than six months, visitors to the Drudge
Report say they got malware in addition to the Web site’s usual
sensational headlines. Matt Drudge denied that his site was
infecting visitors, however it’s likely that the malware is coming from
ads delivered by a third-party ad network and not the site itself. Read the full article. [CNet]
[img_assist|nid=3673|title=|desc=|link=none|align=right|width=100|height=100]Security researchers have found the Mariposa bot client pre-installed on a mobile phone handset distributed in Europe, and say that the malware looks to have been installed on the phone’s memory card.
SAN FRANCISCO–Despite years of efforts by software security teams at major vendors to harden the operating systems and browsers that are the most common targets of attackers, exploitation of new as well as older vulnerabilities is still simpler than many people might think.
[img_assist|nid=3649|title=|desc=|link=none|align=left|width=100|height=100]The United States Computer Emergency Response Team (US-CERT) has warned that the software included in the Energizer DUO USB battery charger contains a backdoor that allows unauthorized remote system access.
[img_assist|nid=3643|title=|desc=|link=none|align=right|width=100|height=100]Microsoft’s idea that the fight against malware could be funded by an Internet tax is “horrible,” an analyst said as other experts weighed in on a recent comment by the company’s security chief. Read the full article. [Computerworld]