Malware

As we round the bend into the second half of 2011, enterprises face a triple threat on the IT security front. These threats won't be easily addressed merely by updating anti-virus programs. Some attacks will be capable of reaching even the security-minded users. Here are three main threats that will...

A new malware package is running wild on the Internet, according to Kaspersky Labs, and its creators are attempting to create an indestructible herd of zombified machines. The botnet has been dubbed "TDL-4," which Kaspersky describes as "the most sophisticated threat today." The creators use the sam...

EXPERT ADVICE

Securing SCADA Systems: Where Do We Start?

Many leading industrial and governmental network infrastructures employ SCADA systems to automate, monitor and control crucial physical processes, including manufacturing and testing, electrical transmission, water and fuel transport, and traffic signal operation. Because of their crucial importance...

A new malware attack aimed at stealing BitCoin wallets is on the loose, according to information released by security firm Symantec. The attack has led to reports of at least one theft amounting to approximately $500,000. BitCoins are a form of virtual currency. The relatively unregulated method of ...

Android apps are becoming more popular as the Android operating system gains ground in the mobile market. IDC expects Android to take more than 40 percent of the worldwide smartphone market in the second half of 2011. However, with Android's growing popularity comes a growing risk of malware attacks...

Gmail is not the only e-mail service whose users have been targeted by spear-phishing hackers. Users at Yahoo Mail and Hotmail are also on the email infiltrators' hit lists, according to security firm Trend Micro. The attacks on the latter two email systems appear to be separately conducted, said Na...

Italian security researcher Rosario Valotta has discovered a new way for hackers to steal their victims' online credentials -- stealing the session cookies from whatever site a victim is visiting. The stolen cookies can then be used to get victims' computers to download malware, forge clicks or send...

The FBI has requested and received a preliminary injunction from a U.S. district judge to continuing issuing "stop" commands to the zombie machines infected with the Coreflood botnet. It is an essential step that is part of the agency's dramatic takedown of the botnet's command-and-control system ea...

The United States Department of Justice and the Federal Bureau of Investigation have hammered the Coreflood botnet, which its owners used to conduct cyberfraud on a massive scale. They have seized five command and control servers and 29 domain names registered in the United States, obtained a tempor...

The state of Web security has never been pretty, and a new report from Symantec discussing current and future threats only highlights just how risky the Internet environment has become. The daily volume of Web-based attacks increased an eye-popping 93 percent from 2009 to 2010, the report says -- ...

IT security giant RSA is still trying to figure out exactly what was stolen from its systems, more than two weeks after announcing that they had been breached. The company detailed how the attackers broke into its systems, in a blog post by Uri Rivner, its head of new technologies, consumer identity...

An SQL injection attack dubbed "LizaMoon" by security vendor WebSense has spread itself all over the Web. WebSense, which spotted the attack, asserts that Google search results show more than 1.5 million URLs have a link with the same URL structure as the initial attack and that more than 500,000 UR...

Cybercriminals are following innocent consumers away from email and toward more popular, smartphone-style platforms, McAfee reported Tuesday. "New mobile malware in 2010 increased by 46 percent compared with 2009," noted McAfee spokesperson Joris Evers. In 2010, Symbian and Android platforms, in par...

Twitter has been hit by fast-spreading spam using Google's goo.gl URL shortening service. The attack sends malicious links that take recipients clicking on them to a website hosting the "Security Shield" antivirus software program. When users land on that site, they are essentially tricked into down...

A new Trojan that can create botnets has emerged in China, according to Lookout Mobile Security. This Trojan, dubbed "Geinimi," is the most sophisticated Android malware so far, the company said. Once it's installed on a user's phone, Geinimi can receive commands from a remote server that lets that ...

Technewsworld Channels