Read more about botnet
Bookmark and Share
  • ZeroAccess developers continue to innovate

    22.08.2013

    A while ago a group of researchers has analyzed and tested the resilience of P2P botnets, and has discovered that while Zeus and Sality botnets are highly resilient to sinkholing attacks, Kelihos and ZeroAccess botnets have weaknesses that can be used to disrupt them.

  • Analyzing the Fort Disco bruteforce campaign

    07.08.2013

    In recent months, several researchers have highlighted an uptick in bruteforce password guessing attacks targeting blogging and content management systems.

  • Security complexity and internal breaches are key concerns

    30.07.2013

    Growth in external hacking attempts, DDoS and malware attacks, and internal threats to data are the key security concerns for UK businesses.

  • TOR-based botnets on the rise

    25.07.2013

    Keeping their botnet's C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified.

  • Large Pony botnet controller discovered

    03.07.2013

    Every once in a while we get to peek into the lion’s den, this time we’ll be checking out a fairly large instance of the Pony botnet controller, containing a large amount of stolen credentials and other goodies.




Spotlight

Android Fake ID bug allows malware to impersonate trusted apps

Posted on 29 July 2014.  |  Bluebox Security researchers unearthed a critical Android vulnerability which can be used by malicious applications to impersonate specially recognized trusted apps - and get all the privileges they have - without the user being none the wiser.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Jul 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //