Tag Archives: read-our-privacy-policy

Tor-using Mevade botnet is stealthy new version of old threat

The Mevade Trojan and botnet have gained unexpected notoriety when it turned out that the majority of the recent, sudden and massive uptick in Tor users was the result of it adding Tor as a method of …

Read More:
Tor-using Mevade botnet is stealthy new version of old threat

Multiplayer games and DoS attacks

Prolexic, detailed the rampant problem of denial of service attacks within and from online gaming communities. The DDoS attacks, which can pack a powerful punch by the use of reflection and amplificat…

See the article here:
Multiplayer games and DoS attacks

C&C PHP script for staging DDoS attacks sold on underground forums

Earlier this year, US-CERT has deemed it important to release an alert about publicly accessible open recursive DNS servers that are increasingly being used in DNS amplification attacks – a very effec…

More here:
C&C PHP script for staging DDoS attacks sold on underground forums

Timing is an influential risk-factor for cyber attacks

There are several dates throughout the year that are notorious for wreaking havoc on businesses via DDoS attacks, data breaches and even malware or botnet assaults. According to Radware, there ar…

Read More:
Timing is an influential risk-factor for cyber attacks

Massive spike of Tor users caused by Mevade botnet

When Project Tor director Roger Dingledine recently drew the public's attention to the unusual and considerable rise in the number of Tor users, he invited people to speculate and share plausible expl…

Read the article:
Massive spike of Tor users caused by Mevade botnet

Understanding and defending against Denial of Service attacks

Denial of Service (DoS) attacks continue to be on the rise, which is no surprise given our ever-growing dependency on Web-based services, coupled with the fact that these attacks are relatively cheap …

View article:
Understanding and defending against Denial of Service attacks

Obad Android Trojan distributed via mobile botnets

When first unearthed three months ago, the Obad Android Trojan has fascinated researchers with its sophistication. Difficult to analyze, using a bug in the Android OS to extend Device Administrato…

Original post:
Obad Android Trojan distributed via mobile botnets

Fraud and identity theft camouflaged by DDoS attacks

Prolexic shared attack signatures and details that are helpful to detect and stop DDoS attacks from the Drive DDoS toolkit, an attack tool often used as a source of distraction while criminals break i…

More:
Fraud and identity theft camouflaged by DDoS attacks