Tag Archives: help-net-security

Massive spike of Tor users caused by Mevade botnet

When Project Tor director Roger Dingledine recently drew the public's attention to the unusual and considerable rise in the number of Tor users, he invited people to speculate and share plausible expl…

Read the article:
Massive spike of Tor users caused by Mevade botnet

Understanding and defending against Denial of Service attacks

Denial of Service (DoS) attacks continue to be on the rise, which is no surprise given our ever-growing dependency on Web-based services, coupled with the fact that these attacks are relatively cheap …

View article:
Understanding and defending against Denial of Service attacks

Obad Android Trojan distributed via mobile botnets

When first unearthed three months ago, the Obad Android Trojan has fascinated researchers with its sophistication. Difficult to analyze, using a bug in the Android OS to extend Device Administrato…

Original post:
Obad Android Trojan distributed via mobile botnets

Fraud and identity theft camouflaged by DDoS attacks

Prolexic shared attack signatures and details that are helpful to detect and stop DDoS attacks from the Drive DDoS toolkit, an attack tool often used as a source of distraction while criminals break i…

More:
Fraud and identity theft camouflaged by DDoS attacks

Largest DDoS attack ever disrupts China's Internet

The China Internet Network Information Center (CNNIC), which maintains the registry for the .cn, China's country code top-level domain, has notified the public that two massive DDoS attacks have been …

See the original article here:
Largest DDoS attack ever disrupts China's Internet

Popular Windows downloader has secret DDoS capability

Unbeknownst to its users and perhaps even to its developers, the popular Windows download manager Orbit Downloader has been outfitted with a DDoS component. The Orbit Downloader has been around s…

Continued here:
Popular Windows downloader has secret DDoS capability

ZeroAccess developers continue to innovate

A while ago a group of researchers has analyzed and tested the resilience of P2P botnets, and has discovered that while Zeus and Sality botnets are highly resilient to sinkholing attacks, Kelihos and …

More:
ZeroAccess developers continue to innovate

ZeroAcces rootkit dominates, adds new persistence techniques

According to a recent report by Alcatel-Lucent subsidiary Kindsight, as much as 10 percent of home networks and over 0.5 percent of mobile devices are infected with malware, and the ZeroAccess botnet …

View article:
ZeroAcces rootkit dominates, adds new persistence techniques