Researchers have discovered that a sophisticated botnet searched the Internet specifically looking for VoIP systems.Read More >
Researchers have found that cybercriminals "activities impose disproportionate costs on society" and cite, for example, that a botnet spam campaign netted its authors $2.7 million while worldwide expenditures on spam prevention cost nearly $1 billion in US dollars.Read More >
We know that when millions of compromised computers are linked together the resulting botnet can be used to spew spam or create large denial of service attacks. But, could the same happen with compromised Sony PlayStation 3 gaming consoles? Marsh Ray, a senior software engineer at PhoneFactor who along with CTO Steven Dispensa discovered an SSL flaw in 2009, has proposed an intriguing theory about the initial hack and how the PlayStation hack could lead to a botnet.Read More >
Over the past three months, researchers at Arbor Networks have been tracking some strange activity among several associated botnets aimed at telecom companies and specialized manufacturers worldwide. The piece of malware used by these botnets, called Darkshell, uses a slew of servers in China to launch specific attacks against manufacturers of food processing machines.Read More >
New malware targeted specifically to Android smartphones has recently been found in China. The Trojan, known as "Geinimi," is generally disguised as a game app and once installed can send personal information from the phone to a remote server. The malware could be putting sensitive user data at risk but interestingly, that's not all it does.Read More >
Unbeknown to most end users, a new sophisticated piece of malware corrals consumer routers and DSL modems into a lethal botnet. Using a variety of strategies for exploitation, this could be an attack vector for the theft of personally identifying information – a technique that’s not going away, according to researchers at DroneBL.
Read More >
The "psyb0t" worm is believed to be the first piece of malware to target home networking gear, which bills itself as a real-time monitor of abusable internet addresses. It has already infiltrated an estimated 100,000 hosts. It has been used to carry out DDoS, or distributed denial of service, attacks and is also believed to use deep-packet inspection to harvest user names and passwords.