malicious software

Microsoft: Founder of botnets Kelihos worked Agnitum

Microsoft officials have filed a lawsuit in U.S. District Court, accusing a resident of St. Petersburg in the coding and participation in the creation botnets Kelihos. Four months later, after Microsoft managed to eliminate botnet Kelihos, representatives of the corporation identified a man who stands behind a massive network, which control the distribution of spam, and compromised data. Microsoft(…)

McAfee: Report on upcoming threats in 2012

In 2012. expected to increase the number of threats to mobile platforms, the frequent use of forged digital certificates, as well as attacks on key infrastructure. The company’s specialists McAfee produced a report on the threats faced by Internet users in 2012. Experts point out that future attacks will be aimed at policy makers, infrastructure and public figures. “Many of the(…)

The number of malware samples exceed 75 million by 2012

According to McAfee, the number of new malware samples exceed 75 million by the end of the year. In the quarterly report on the threats, the company reported that the number of new models over the preliminary assessment and makes the company to change its forecast, increasing performance. Toralv Dyrr, a strategist in the security(…)

IID: malware market is entering an era of maturity

Malware and cyber criminals are increasingly focused on specific types of attacks and methods of operation, according to security firm IID. In its quarterly report on the threats, the company reported that researchers have noticed a trend toward specialization in the space of malicious programs, and many criminals are focused on one particular area of(…)

Botnet TDL4 entered a new stage in the evolution

Lead researcher David Harley ESET said that over time, while he and his staff watched TDL4, they noted the passage of the botnet to a new stage of evolution. These changes, he said, could be a signal that a team that develops a malicious program has been replaced or that the developers have started to(…)

Cloud service promises a 99% free from spam box

Phishing attack, which was the cause of network penetration RSA last March, showed that the mail remains the weakest link in the chain of corporate security. Even though the filtering system blocks most malicious and simply annoying messages, their own volume demonstrates the potential to be used by the attackers. Now one of the companies engaged in e-mail filtering,(…)

Ten years for Nimda: the worm’s author has not been caught

Saturday was marked by the 10th anniversary of the infamous worm Nimda . Nimda (if you read on the contrary, it will be admin) was a hybrid worm that spreads via e-mail attachments and through the sites running the vulnerable versions of IIS at Microsoft. Malicious software vulnerabilities used folder traversal, which was patched Microsoft a month after(…)

Fraudulent shops go for free domains

Instead of breaking existing sites, hackers prefer to create their own on a free service. Tk. Researchers found more than 6 million domains linking to online stores that distribute malicious software. Zscaler company says that because the Web sites. Tk are free, it is not surprising that they are criminals.Scammers and spammers are using them to(…)

Report Symantec: MBR-infection back

Symantec Experts at its next August report [PDF 1,75 MB] announced a renewed interest by hackers to infections MBR (Master Boot Record, MBR). The operation to check the boot sector of the hard disk is held immediately after turning on the computer. Infection of this area can take control of your computer. Therefore, changing the MBR is so attractive(…)