Search Results

Network security professionals from the company Rapid7 found, perhaps one of the first botnet that infected computers with connection management server was carried out with the help of technology TOR, providing anonymous access to the Internet. The discoverers of the botnet, known as Skynet, the artificial intelligence in the Terminator movies about, warned that as […]

Phishers use a legitimate email from Microsoft to exploit the vulnerability in Java If you click on the link in the message, spammers send out falls victim to a page with an exploit, which establishes a system of Trojan Zeus. The site Internet Storm Center (ISC) at SANS Institute, a notification appears on the current […]

Sophisticated malicious software by cybercriminals designed to silently steal banking credentials from victimized systems has been swimming the World Wide Web since 2002. However, it recorded its highest infections in the past three months. According to a new report from Trend Micro, they recorded over 200,000 new infections from July through September which is the […]

Anti-virus company revealed the new technology of cloud cyber attacks. Experts in the field of computer security have identified a new way of carrying out cyber attacks based on the placement of the virus code in the cloud storage. According to experts of G Data, the virus placed in the “cloud ” can be used […]

ESET antivirus company reported the detection of new malware Linux / Chapro.A, used by hackers to launch attacks on visitors to a site hosted on compromised Linux-servers. Feature of the Linux / Chapro.A is that malicious code is designed as a module for http-server Apache, substitution occurs exploit browsers iframe or JavaScript-blocks in traffic is […]

Cybercrime has become a source of considerable income even for the rank and file of shadow schemes, says consulting firm in the field of information security Fortinet. Senior security analyst in the division of FortiGuard Fortinet Derek Manky spent more than a year for tracking online communities in which virtual intruders are a set of […]

According to experts, cyber criminals target, at least 30 major U.S. banks. Antivirus company McAfee researchers found that cybercriminals are preparing a number of large-scale attacks against the United States, which would be implemented in the spring of next year. As it became known to the experts, the project named ‘Blitzkrieg’ should destabilize the system […]

Remote banking and electronic payments via the Internet has made our life more comfortable – banking operations can now be performed from any location equipped with Internet access, without visiting a bank office. However, we must constantly ask ourselves the question: how much of our equipment protected from the banking malware? A timely manner, we […]

Every year the information security threats are becoming more difficult to detect. 2011 for most businesses was a year of awareness of the seriousness of issues related to information security, as many well-known organizations have experienced hacking of information systems and information leakage. During 2012, we can see that there are new types of malicious […]

Group IB researchers discovered a vulnerability in Adobe Reader X and XI, which is actively exploited by hackers. Experts of Group IB discovered a vulnerability in Adobe Reader version X and XI, which is actively exploited by virus writers. This vulnerability allows a remote user to execute arbitrary code on the target system, for which […]