Read more about botnet
Bookmark and Share
  • Massive spike of Tor users caused by Mevade botnet

    06.09.2013

    When Project Tor director Roger Dingledine recently drew the public's attention to the unusual and considerable rise in the number of Tor users, he invited people to speculate and share plausible explanations about it because, by his own admission, they were unable to find it out by themselves.

  • Obad Android Trojan distributed via mobile botnets

    05.09.2013

    When first unearthed three months ago, the Obad Android Trojan has fascinated researchers with its sophistication.

  • Sykipot-wielding attackers now targeting US civil aviation firms

    05.09.2013

    The Sykipot backdoor Trojan is not a new threat. First detected over six years ago, its existence and use has been tied almost exclusively with the cyber espionage activities of a group or groups of attackers that are likely to be based in China.

  • Kelihos botnet: What victims can expect

    28.08.2013

    Kelihos is a botnet which utilizes P2P communication to maintain its CnC Network.

  • ZeroAccess developers continue to innovate

    22.08.2013

    A while ago a group of researchers has analyzed and tested the resilience of P2P botnets, and has discovered that while Zeus and Sality botnets are highly resilient to sinkholing attacks, Kelihos and ZeroAccess botnets have weaknesses that can be used to disrupt them.




Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //