Tag Archives: myspace-visitor

Mobile malware, botnets and attacks on the cloud to rise

ESET has published its annual review of the past year's threat trends and compiled predictions for 2013. According to the new report, the 2013 threatscape will see major growth of mobile malware and i…

Follow this link:
Mobile malware, botnets and attacks on the cloud to rise

Week in review: Malicious QR codes, Tor-powered botnet, and Mac users hit with SMS fraud

Here's an overview of some of last week's most interesting news, videos and articles: Motives behind IT budget spend and 2013 cloud trends A global survey of 550 CIOs, IT Directors, and senior I…

Read More:
Week in review: Malicious QR codes, Tor-powered botnet, and Mac users hit with SMS fraud

Top 7 security predictions for 2013

A seismic shift in who controls the Internet? Another Mac malware outbreak? Your smart TV being highjacked for a DDoS attack? Whatever 2013 may bring, it’s sure to be an interesting year. Here’s F-Sec…

Taken from:
Top 7 security predictions for 2013

Researchers uncover Tor-powered Skynet botnet

Rapid7 researchers have recently unearthed an unusual piece of malware that turned out to be crucial to the formation of an elusive botnet – dubbed Skynet by the researchers – whose existence has been…

Follow this link:
Researchers uncover Tor-powered Skynet botnet

U.K. hacker convicted for taking part in Anonymous attacks

22-year-old Christopher Weatherhead from Northampton, U.K., has been convicted on Thursday on one count of conspiracy to impair the operation of computers for his involvement in the DDoS campaign agai…

Follow this link:
U.K. hacker convicted for taking part in Anonymous attacks

Gameover gang uses Cutwail botnet to swell its own

The hackers behind the Gameover variant of the popular Zeus banking Trojan have rented the massive Cutwail botnet in order to send out millions of fake emails carrying the malware, warns Dell SecureWo…

See more here:
Gameover gang uses Cutwail botnet to swell its own

65% of organizations experience three DDoS attacks a year

Despite the increasing sophistication and severity of cyber attacks, a survey of more than 700 senior IT professionals reveals that organizations are surprisingly unarmed to deal with today’s threat l…

More:
65% of organizations experience three DDoS attacks a year

Life cycle and detection of an exploit kit

As the process of owning systems and dragging them into botnets becomes ever more commercialized, exploit kits have emerged as a favorite of attackers. Their point-click-own nature means even non-tech…

See the original article here:
Life cycle and detection of an exploit kit