Introduction
The Zeus malware, a.k.a. Zbot, is a bot that is capable of stealing private and sensitive information including personal passwords and banking information from infected hosts. Its command-and-control (C&C) server can also control th...
Ransomware is a type of malware that restricts usage of the device it infects, demanding a ransom from the end-user in order to regain control over the device.
Now, the malware could actually damage/encrypt the system and the files on it or it could...
In a previous blog post on Dexter, we briefly mentioned a new strain of point-of sale (PoS) malware that has compromised over 4,500 credit cards in the United States and Canada. This new strain of malware, dubbed JackPOS, was detected early this year...
"The battle for the Internet of Things has just begun. According to industry research firm IDC, the IoT market is expected to hit $7.1 trillion by 2020," said John Maddison, vice president of marketing at Fortinet. "The ultimate winners of the IoT co...
Researchers recently discovered a new banking trojan that, like the recently fallen Zeus botnet, is also capable of bypassing the Secure Sockets Layer (SSL). Some speculation even suggests that this baddy is filling the empty shoes that Zeus has left...
Darkness, a.k.a. Optima, is a bot that majors in performing distributed denial-of-service (DDoS) attacks. This botnet is an old one that has been in the Russian cybercrime underground market for a long time. Since 2013, there has been no new update a...
The games have began and we aren't just talking about football.
Unsolicited emails:
Beware of spam emails that say you're the lucky winner of a lottery for two free tickets to the World Cup, or promises to give you free access to Websites that let...
Whenever we refer to macro threats, we are reminded of those malicious macros in the old days which infect Microsoft Office documents. Contrary to popular belief, macro threats haven't completely disappeared. Even with many new security features add...
Exploit developers should be very excited recently; lots of big bombs have been dropped to the community.
In February, Yang Yu was awarded the Microsoft mitigation bypass bounty, the top prize in Microsoft Bounty Programs. He talked about parts of...
It's no secret that most DNS reflection attacks flooding the Internet today are caused by spoofing the source address. SYN floods, for example, are spoofed TCP floods, in which the source of the IP packets appears to be different than their actual or...