Malware

IT security provider Kaspersky Lab has issued a security alert following the detection of a particularly malicious piece of "ransomware." Kaspersky researchers were the first to detect and issue warnings that a new, stronger version of the Gpcode virus was on the loose. Even though it doesn't appear...

EXCLUSIVE INTERVIEW

Hunting Botnets With Randal Vaughn

You might call Randal Vaughn the Botnet Slayer. After all, he spends much of his time researching the intricacies of cybercrime carried out through malware marauders perpetrating their evil deeds with robotized computers around the globe. When Vaughn is not peering through sinuous Internet traffic r...

A new type of Trojan horse malware application is hiding inside fake MP3 media files, infecting approximately 500,000 consumer PCs, McAfee Avert Labs reported. The nefarious files have been delivered primarily on peer-to-peer networks during the last several days. The trojan, known as "Downloader-UA...

Malware creators are taking advantage of the controversy over the upcoming Olympic Games to spread their wares for illicit financial gain. Latching onto the Free Tibet political demonstrations that have spread around the world, would-be thieves have embedded a piece of rootkit malware that logs keys...

Internet service providers that serve advertising when a user requests a Web page that doesn't exist are exposing their users to a giant security breach, according to security researcher Dan Kaminsky. The vulnerability resulting from the practice, which is an increasingly common way for ISPs to make...

The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...

After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...

PRODUCT PROFILE

Microsoft Releases Forefront Stirling to Beta

Microsoft has unveiled the public beta of its Forefront enterprise security product, known as "Stirling." This is a single product that delivers coordinated protection across desktop and server applications and the network edge. It comes with a single dashboard that shows all the systems protected b...

CONFERENCE REPORT

Symantec CEO Calls for Federal Hacking Law

The federal government should step in and pass laws to ensure computer security, the CEO of Symantec told a security conference Tuesday. In the last six months of 2007, nearly 50 million people worldwide were the victims of identity theft, and 70 percent of the most common malicious code used in att...

Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference. This includes a new active real-time inspection technology that checks both inbound and outbound Web traffic and SSL traffic for malicious content to provide e...

It's quiet on the streets of San Francisco today, the first day of the RSA Security Conference, being held at the Moscone Convention Center south of Market Street. Traffic on the streets is light, so either the cops are doing a good job redirecting the crazy San Francisco traffic, which in this area...

Early adopters are typically characterized as progressive risk-takers who have little to lose and much to gain. Following this logic, it makes perfect sense that within this crowd we find bot herders -- hackers who control a large number of compromised PCs for malicious purposes. Yet it's unsettling...

The business use of e-mail worldwide has become so critical that the ever-increasing number of spam attacks containing malware are placing corporate and customer information at the highest levels of risk yet, according to an industry-wide survey Internet security firm Webroot conducted last month. W...

Phishing is a tactic known to malicious hackers ever since the first one crawled out of a swamp and onto dry land. It's another variation on social engineering. The phisher's goal is to get people to open themselves up to technical vulnerabilities through nontechnical means. However, even though mos...

The IT security front is like any war: Secure one battle line and a breach may occur on another. Red flags about malware have become almost a daily occurrence in the virtual world, and the malware lexicon has mushroomed in recent years. Terms like "zombie," "rootkit," "worm," "Trojan," "spyware," "b...

Technewsworld Channels