Security was recently at the center of the Beebone botnet takedown. Join Raj Samani, Intel Security CTO in this webcast and learn what it takes to bring down a botnet.
A new do-it-yourself botnet generating tool has leaked in the wild, but miscreants believe it's not worth its $10,000 price tag.
Cyber criminals are always looking for ways to fill their pockets, but SMBs seem to be a prime target.
Researchers have discovered that a majority of the infected machines enlisted in a botnet capable of stealing up to $100,000 per day are based in the United States.
Since July, researchers have been tracking a new variant of Pushdo, which is mixing command-and-control traffic with bogus HTTP requests to legitimate sites with the goal of evading detection.
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
One of the world's largest spam botnets, responsible for as much as a third of all unwanted mail sent as recently as last week, is finally offline, according to security firm FireEye.
The existence of an Android spam botnet is disputed, with some saying more proof is needed. No matter the truth, the incident underscores the dangers of installing mobile applications from unofficial sources.
News briefs: The latest news from Apple, Verizon, CrowdStrike, FTC and more
Researchers have discovered a correlation between infected WordPress sites and the propagation of the prolific Mac Flashback trojan.
Security experts are backing up one anti-virus vendor's estimate of the massive size of a Mac trojan botnet.
After being "sinkholed," the Kelihos.B botnet has been reconfigured and is spreading through social networking sites.
A collaborative effort of security organizations announced Wednesday that they knocked offline an embodiment of the Kelihos botnet, which was believed dead, but since emerged with new capabilities.
Friday is the deadline for public comments regarding a government proposal to create a model by which internet service providers voluntarily alert consumers if their computers are part of a botnet.
The Kelihos botnet, made up of approximately 41,000 infected computers worldwide, was capable of sending 3.8 billion spam emails per day.
Microsoft has prevailed in its civil case against the operators of the Rustock botnet, which in its heyday controlled a network of more than a million computers.
Researchers at Trend Micro say they have been hot on the tracks of a corporate hacker, and now they are turning over their findings to U.S. law enforcement.
McAfee has fired back at critics of its report on Operation Shady RAT, and said the CEO of rival anti-virus maker Kaspersky Lab, who called the report "alarmist," missed the whole point of the expose.
A new botnet made up of more than 4.5 million infected computers is "practically indestructible," according to researchers at Kaspersky Lab. But some disagree.
Federal authorities have taken over the control hub of the prolific Coreflood botnet and filed a civil complaint against 13 unnamed defendants.
Scientists in Canada have replicated a botnet to study its behaviour, infecting 3,000 virtual machines with the Waledec malware.
The Rustock botnet, dubbed the biggest source of global spam, has resumed activity after a two-week break, according to security researchers at Symantec.
Advocacy groups and independent media face a variety of damaging cyberattacks, and there is little they can do to stop them, a new study from Harvard University concludes.
A Russian man who is believed to be the operator of the Mega-D botnet, one of the largest spam senders in the world, has been arrested and is scheduled to be arraigned on Friday in federal court.
A former University of Akron student was sentenced Friday to 30 months in prison for using the school's computer network to control a botnet and launch distributed denial-of-service (DDoS) attacks against conservative websites belonging to Bill O'Reilly, Ann Coulter and Rudy Giuliani. Mitchell Frost, 23, of Bellevue, Ohio admitted to, in 2006 and 2007, scanning the internet to find vulnerable computer networks to access and gain control over and then using the botnet to initiate DDoS attacks that temporarily interrupted the operation of www.billoreilly.com, www.anncoulter.com and www.joinrudy2008.com. He also must serve three years of supervised release. - DK
A hacker group responsible for defacement attacks against Twitter and Baidu now appears to be amassing a mighty botnet, according to researchers at a security firm.
A growing spam attack warning recipients of a problem with their tax payments has been circulating. But it is more than a phishing ploy to attain recipients' confidential information, according to Solera Networks. Researchers at the network forensics company have evidence that this campaign is actually infecting machines using a new exploit to join a pre-existing Zeus botnet. — GM
Governments, the IT industry and internet access providers should evaluate and ensure the health of consumer devices before allowing them full access to the internet, according to a Microsoft executive.
Researchers have discovered a fast-growing botnet that was designed as part of a commercial service for launching DDoS attacks.
The person responsible for the "Here you have" email worm, which wreaked havoc last week on businesses across the United States, may be part of a cyber-jihad group wanting to hack into U.S. Army IT systems.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Harman Kardon claims only Chrysler vehicles may have vulnerable system
- Government 'Cybersecurity Sprint' spurs agency authentication measures
- Hackers spread malware via Yahoo ads
- Report: News, entertainment websites serve majority of malvertisements
- UConn School of Engineering cyberintrusion originated in China