Read more about botnet
Bookmark and Share
  • TOR-based botnets on the rise

    25.07.2013

    Keeping their botnet's C&C centers online is crucial for bot herders, so that they can keep taking advantage of the computers they zombified.

  • Large Pony botnet controller discovered

    03.07.2013

    Every once in a while we get to peek into the lion’s den, this time we’ll be checking out a fairly large instance of the Pony botnet controller, containing a large amount of stolen credentials and other goodies.

  • Current cybercrime market is all about Cybercrime-as-a-Service

    02.07.2013

    The cybercrime market is constantly evolving, and it is currently full of knowledgeable individuals who have focused on their core competencies to offer services to those who have not the skills, patience or time to make what they want or need for their criminal exploits.

  • Researchers reveal tricks for Cutwail's endurance

    25.06.2013

    While some botherders have opted for the arguably much safer P2P architecture in order to assure their botnets' resilience, others are still clinging to the standard distributed C&C option.

  • DDoS attacks: What they are and how to protect yourself

    24.06.2013

    Ameen Pishdadi is the CTO at GigeNET. In this interview he discusses the various types of DDoS attacks, tells us who is at risk, tackles information gathering during attacks, lays out the lessons that he's learned when he mitigated large DDoS attacks, and more.




Spotlight

Most popular Android apps open users to MITM attacks

Posted on 21 August 2014.  |  An analysis of the 1,000 most popular free Android apps from the Google Play store has revealed a depressing fact: most of them sport an SSL/TLS vulnerability that can be misused for executing MITM attacks, and occasionally additional ones, as well.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Aug 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //