A new do-it-yourself botnet generating tool has leaked in the wild, but miscreants believe it's not worth its $10,000 price tag.
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
Researchers have discovered that a majority of the infected machines enlisted in a botnet capable of stealing up to $100,000 per day are based in the United States.
Since July, researchers have been tracking a new variant of Pushdo, which is mixing command-and-control traffic with bogus HTTP requests to legitimate sites with the goal of evading detection.
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
One of the world's largest spam botnets, responsible for as much as a third of all unwanted mail sent as recently as last week, is finally offline, according to security firm FireEye.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
News briefs: The latest news from Apple, Verizon, CrowdStrike, FTC and more
Researchers have discovered a correlation between infected WordPress sites and the propagation of the prolific Mac Flashback trojan.
Security experts are backing up one anti-virus vendor's estimate of the massive size of a Mac trojan botnet.
After being "sinkholed," the Kelihos.B botnet has been reconfigured and is spreading through social networking sites.
A collaborative effort of security organizations announced Wednesday that they knocked offline an embodiment of the Kelihos botnet, which was believed dead, but since emerged with new capabilities.
Friday is the deadline for public comments regarding a government proposal to create a model by which internet service providers voluntarily alert consumers if their computers are part of a botnet.
The Kelihos botnet, made up of approximately 41,000 infected computers worldwide, was capable of sending 3.8 billion spam emails per day.
Microsoft has prevailed in its civil case against the operators of the Rustock botnet, which in its heyday controlled a network of more than a million computers.
Researchers at Trend Micro say they have been hot on the tracks of a corporate hacker, and now they are turning over their findings to U.S. law enforcement.
McAfee has fired back at critics of its report on Operation Shady RAT, and said the CEO of rival anti-virus maker Kaspersky Lab, who called the report "alarmist," missed the whole point of the expose.
A new botnet made up of more than 4.5 million infected computers is "practically indestructible," according to researchers at Kaspersky Lab. But some disagree.
Federal authorities have taken over the control hub of the prolific Coreflood botnet and filed a civil complaint against 13 unnamed defendants.
Scientists in Canada have replicated a botnet to study its behaviour, infecting 3,000 virtual machines with the Waledec malware.
The Rustock botnet, dubbed the biggest source of global spam, has resumed activity after a two-week break, according to security researchers at Symantec.
Advocacy groups and independent media face a variety of damaging cyberattacks, and there is little they can do to stop them, a new study from Harvard University concludes.
A Russian man who is believed to be the operator of the Mega-D botnet, one of the largest spam senders in the world, has been arrested and is scheduled to be arraigned on Friday in federal court.
A former University of Akron student was sentenced Friday to 30 months in prison for using the school's computer network to control a botnet and launch distributed denial-of-service (DDoS) attacks against conservative websites belonging to Bill O'Reilly, Ann Coulter and Rudy Giuliani. Mitchell Frost, 23, of Bellevue, Ohio admitted to, in 2006 and 2007, scanning the internet to find vulnerable computer networks to access and gain control over and then using the botnet to initiate DDoS attacks that temporarily interrupted the operation of www.billoreilly.com, www.anncoulter.com and www.joinrudy2008.com. He also must serve three years of supervised release. - DK
A hacker group responsible for defacement attacks against Twitter and Baidu now appears to be amassing a mighty botnet, according to researchers at a security firm.
A growing spam attack warning recipients of a problem with their tax payments has been circulating. But it is more than a phishing ploy to attain recipients' confidential information, according to Solera Networks. Researchers at the network forensics company have evidence that this campaign is actually infecting machines using a new exploit to join a pre-existing Zeus botnet. — GM
Governments, the IT industry and internet access providers should evaluate and ensure the health of consumer devices before allowing them full access to the internet, according to a Microsoft executive.
Researchers have discovered a fast-growing botnet that was designed as part of a commercial service for launching DDoS attacks.
The person responsible for the "Here you have" email worm, which wreaked havoc last week on businesses across the United States, may be part of a cyber-jihad group wanting to hack into U.S. Army IT systems.
Security industry efforts to permanently shut down the prolific Waledac botnet have been successful, according to Microsoft.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Malware on Lime Crime website, payment cards compromised
- Florida law enforcement docs show widespread stingray use, secrecy
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- Bug in popular WordPress plugin opens up websites to SQL injection attacks
- State breakdowns: Anthem breach by the numbers
- Carbanak APT campaign made off with $1B from banks globally
- BMW issues security patch for bug allowing attackers physical access into vehicles
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Natural Grocers investigating unauthorized access to POS systems
- Proposed Consumer Privacy Bill of Rights Act doesn't go far enough, critics say
- Data at risk for about 50,000 current and former Uber drivers
- North Carolina credit union notification says laptop containing data missing
- Skills in demand: Application security engineers