A new do-it-yourself botnet generating tool has leaked in the wild, but miscreants believe it's not worth its $10,000 price tag.
Over the course of a week, two trojan-spreading scams have emerged that aim for users of the internet phone service.
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
Researchers have discovered that a majority of the infected machines enlisted in a botnet capable of stealing up to $100,000 per day are based in the United States.
The latest TDL-4 malware version uses a domain-generation algorithm, so its command-and-control infrastructure can skirt detection.
Since July, researchers have been tracking a new variant of Pushdo, which is mixing command-and-control traffic with bogus HTTP requests to legitimate sites with the goal of evading detection.
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
One of the world's largest spam botnets, responsible for as much as a third of all unwanted mail sent as recently as last week, is finally offline, according to security firm FireEye.
While Dutch law enforcement managed to shut down two C&C servers, the Grum botnet is still active. And if its controllers are so inclined, they can continue to deliver spam.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
A 22-year-old, accused of using modified versions of the Carberp banking trojan to steal login details and digital signatures from compromised computers, was apprehended in Russia.
News briefs: The latest news from Apple, Verizon, CrowdStrike, FTC and more
Debate: Identifying the culprits behind Koobface will diminish the gang's activity.
Detection numbers continue to rise for the infamous Conficker worm within enterprises, even though there is a patch available and no new variants have appeared in two years.
Researchers have discovered a correlation between infected WordPress sites and the propagation of the prolific Mac Flashback trojan.
Security researchers said the number of Flashback-infected Mac computers significantly fell over the weekend, but that doesn't mean the botnet has been crippled.
Security experts are backing up one anti-virus vendor's estimate of the massive size of a Mac trojan botnet.
After being "sinkholed," the Kelihos.B botnet has been reconfigured and is spreading through social networking sites.
The Anti-Bot Code of Conduct has been approved by the FCC, giving ISPs a blueprint on managing botnet threats.
A collaborative effort of security organizations announced Wednesday that they knocked offline an embodiment of the Kelihos botnet, which was believed dead, but since emerged with new capabilities.
A new industry working group, the Industry Botnet Group, is aimed at developing a model that focuses on creating awareness, prevention and privacy concerning infected machines.
Friday is the deadline for public comments regarding a government proposal to create a model by which internet service providers voluntarily alert consumers if their computers are part of a botnet.
The Kelihos botnet, made up of approximately 41,000 infected computers worldwide, was capable of sending 3.8 billion spam emails per day.
Microsoft has prevailed in its civil case against the operators of the Rustock botnet, which in its heyday controlled a network of more than a million computers.
Researchers at Trend Micro say they have been hot on the tracks of a corporate hacker, and now they are turning over their findings to U.S. law enforcement.
McAfee has fired back at critics of its report on Operation Shady RAT, and said the CEO of rival anti-virus maker Kaspersky Lab, who called the report "alarmist," missed the whole point of the expose.
A new botnet made up of more than 4.5 million infected computers is "practically indestructible," according to researchers at Kaspersky Lab. But some disagree.
Federal authorities have taken over the control hub of the prolific Coreflood botnet and filed a civil complaint against 13 unnamed defendants.
Scientists in Canada have replicated a botnet to study its behaviour, infecting 3,000 virtual machines with the Waledec malware.
The Rustock botnet, dubbed the biggest source of global spam, has resumed activity after a two-week break, according to security researchers at Symantec.