Similar Articles |
|
InternetNews January 15, 2009 Richard Adhikari |
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. |
InternetNews June 17, 2009 Alex Goldman |
Hacked Government and Corporate PCs for Sale A new report from Finjan says that the latest criminal markets are more sophisticated than ever before. |
Bank Technology News December 2010 Michael Sisk |
Endgame Systems Finds Botnets in the Cloud Security software provider Endgame Systems raised $29 million in the fall and simultaneously launched ipTrust, a product meant to detect and manage the harm caused by malware and botnets in cloud computing environments |
InternetNews August 14, 2009 |
Twitter Used as Botnet Control As bot herders learn to exploit legitimate sites, researchers warn that IT managers will need to monitor social media closely. |
PC Magazine August 20, 2008 Matthew D. Sarrel |
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. |
InternetNews December 1, 2008 Richard Adhikari |
Botnets Bouncing Back Despite McColo's takedown, observers say that major senders of spam and malware are returning - and may be stronger than ever. |
InternetNews December 22, 2009 Andy Patrizio |
AMD Sets May Date for Mobile 'Danube' CPUs AMD has its biggest collection of mobile CPUs ever planned for late spring 2010. |
InternetNews March 18, 2011 |
Rustock Botnet Beaten Down by Microsoft On the heels of last year's successful takedown of another giant botnet, Microsoft just shut down a bigger and more sophisticated botnet this week. |
PC World July 23, 2007 Lincoln Spector |
Proper ID for a Zombie PC If you can't tell by its ravenous appetite, glassy-eyed stare, and leprous casing, how do you know whether your system has become one of the living dead? |
InternetNews November 12, 2008 Christopher Saunders |
Media Spotlight Scatters a Botnet Host ISPs spring into action after a mainstream publication fingers a U.S. Web hosting company for its role in the global spam and malware epidemic. |
InternetNews April 27, 2009 Alex Goldman |
Conficker Awakens With Scareware and Spam The new activity on the Conficker botnet shows that the criminal economy is functioning well. |
InternetNews February 11, 2009 Richard Adhikari |
Cybercriminals Launch Attacks Through Digg Bad guys leverage celebrities' names to put malware on victims' PCs. |
InternetNews June 29, 2009 Alex Goldman |
Botnet Blight: Hacked PCs Create 83.2% of Spam A MessageLabs report finds spammers are hard at work with increasingly sophisticated, attack-resistant botnets. |
InternetNews July 18, 2005 Tim Gray |
Trend Micro Stops Spam at The Network Antivirus vendor Trend Micro began rolling out Network Reputation Services, a portfolio of network-based, anti-spam services designed to complement the company's existing anti-spam offerings. |
PC World October 24, 2007 Erik Larkin |
The Internet's Public Enemy Number One The Storm Worm has infected so many machines that it's now one of the most powerful supercomputers. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
InternetNews June 6, 2007 Andy Patrizio |
Microsoft IIS a Popular Target For Malware According to a report by Google, malware is as prevalent on Microsoft's Internet Information Servers as the far more popular Apache Web server. |
InternetNews June 3, 2009 Alex Goldman |
Scareware Arrives on Twitter in Latest Attack As new Web 2.0 threats proliferate, business IT departments struggle with basic tasks such as patch management. |
InternetNews August 23, 2007 Andy Patrizio |
Storm Worm Gathers Strength on The Internet The Storm worm virus is still around, still causing trouble and stronger than ever six months later. |
InternetNews November 15, 2010 |
Malicious Spam Surges in 3Q: Report Kaspersky Lab report finds the volume of malicious spam soared in the third quarter, keeping security software firms and consumers on high alert. |
Wired August 23, 2007 John Robb |
When Bots Attack If you want to bring down a country's information infrastructure and you don't want anyone to know who did it, the weapon of choice is a distributed denial of service attack. |
InternetNews January 30, 2008 Andy Patrizio |
Storm's Creators Face a Storm of Their Own Law enforcement knows who created one of the worst worms to hit the Internet. The hard part is arresting them. |
InternetNews July 21, 2009 Alex Goldman |
Erin Andrews Virus Infects Search, Blogs The taping of the original video was a Peeping Tom crime that criminals are now exploiting to infect PCs. |
InternetNews August 13, 2009 |
Craiglist, AutoCAD Threats Show Virus Variety Malware authors continue showing their creativity, with new viruses making the rounds by targeting Craigslist fans and AutoCAD users. |
InternetNews March 16, 2009 Alex Goldman |
Report Says Spam Arms Race Escalating The bad guys are recovering from the loss of McColo and learning how to prevent being taken down so easily again. |
Wired November 2006 Scott Berinato |
Attack of the Bots The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia - and lost. |
InternetNews November 20, 2009 |
Symantec's 'Unlucky 13' Security Trends for 2010 Hackers and malware purveyors are becoming more sophisticated, meaning computer users need to become wiser and more proactive, too. |
PC Magazine January 1, 2011 Larry Seltzer |
Computer Security: How It Looks for 2011 Here are what security vendors predict for 2011. |
InternetNews October 3, 2007 Andy Patrizio |
Symantec Adds Bot Hunting to Managed Services By using a traceback method, Symantec can look for hidden botnets within a corporate network. |
InternetNews May 25, 2007 Andy Patrizio |
IPv4 Addresses Expected To Run Out In 2010 Groups giving out IP addresses say we're going to come up short in about in about three years. |
Reason July 2003 Jesse Walker |
The Big Block Last year Pennsylvania passed a bill to crack down on child pornography online. The cause was uncontroversial, but the law's approach -- requiring Internet Service Providers to block Web sites based on their Internet Protocol addresses -- drew immediate criticism from the technology community. |
InternetNews November 14, 2005 Jim Wagner |
Postini And The On-Again, Off-Again Spam List Postini briefly found itself on the Spamhaus Project's block list after a recent e-mail campaign, resurrecting the debate over DNS-based Blackhole Lists. |
PC Magazine August 7, 2009 Lance Ulanoff |
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. |
InternetNews May 25, 2007 Andy Patrizio |
Standards Group OKs E-Mail Validation Spec The Internet Engineering Task Force has adopted a vendor-developed specification designed to detect e-mail with bogus header information. The technology could help reduce spam and phishing attacks that clog Internet traffic. |
Popular Mechanics March 2008 Joel Johnson |
How to Configure Wireless Routers With IP Addresses: Tech Clinic How IP addresses are assigned. |
InternetNews September 25, 2009 |
Twitter URLs Again Under Siege by Hackers Hackers are taking advantage of the popular microblogging site's limitations to spread malware. |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. |
BusinessWeek June 16, 2011 Christopher S. Stewart |
FireEye: Botnet Busters When Microsoft and Pfizer got fed up with the nastiest junk e-mail blaster on the Web, they called Silicon Valley's cybercrime vigilante. |
InternetNews January 25, 2011 |
ICQ Users Fend Off Fake AV Campaign A new scareware scam is taking flight on ICQ, attempting to infect users' PCs and mobile devices while selling them a bill of goods. |
InternetNews October 1, 2009 |
Internet Never More Dangerous: Study Report finds a 585 percent spike in fake anti-malware and security software programs in the first half of 2009. |
Scientific American June 2009 Michael Moyer |
What Conficker Reveals About Internet Crime The worm exposes the sophisticated international criminal networks behind modern computer viruses |
InternetNews March 18, 2010 Stuart J. Johnston |
What Microsoft Learned From Botnet Takedown Even software giant Microsoft had trouble corralling the Waledac malware-spreading botnight. |
National Defense October 2009 Jean & Erwin |
Research Detects Spamming Attacks Researchers at Microsoft have developed a system to detect botnet attacks on Web email providers |
InternetNews June 13, 2006 Andy Patrizio |
New Means To Root Out Malware Malware continues to be a problem for customers, with many users unaware their systems are infected with some kind of hidden "bot" that steals their personal info or hijack's their computer. |
InternetNews March 3, 2010 |
Mariposa Hackers Busted in Giant Botnet Scam Three Spanish hackers believed to be responsible for using a botnet to steal log-in credentials and customer banking data were arrested following a multinational investigation. |
InternetNews November 19, 2007 Andy Patrizio |
Hackers Abuse Domain-Name Trust Cyber criminals have devised a new twist on the misspelled domain-name trick by hijacking IP addresses. |
InternetNews January 26, 2009 Richard Adhikari |
Spammers Working to Regain Lost Ground Businesses can expect more malware this year as the spammers recover from the McColo take-down. |
InternetNews November 17, 2010 |
Stuxnet, Mobile Threats Top 3Q Malware Report Security software vendor McAfee's 3Q Threats Report takes note of some older malware scams from the past and some new and discouraging new ones. |
HBS Working Knowledge March 16, 2009 Sean Silverthorne |
When the Internet Runs Out of IP Addresses Experts predict that within three years we will see the last of new Web addresses. What will happen then? Harvard Business School professor Ben Edelman has a solution. |
InternetNews July 7, 2009 Alex Goldman |
Symantec: USB Keys Threaten the Enterprise As criminals innovate to attack PCs, Symantec promised to continue to fight them. |