Posts Tagged ‘cyber criminals’

Your Identity StolenThink you are protected from hackers because you have the latest security program, including anti-malware and antivirus software? Think again.

No matter how secure you think your computer or device is, all are vulnerable to hacker attacks.

Every day, hackers are coming up more ways to steal personal information.


Cyber TerrorismThe level of sophistication in cybercrime and cyber terrorism has dramatically increased in the past five years, and so has the frequency of attacks against American targets. The attacks come from within the U.S. and from around the world.

From the private sector such as credit card and healthcare companies to governmental agencies, and attacks against privately owned computers, no entity or person is immune to the effects of cyber terrorism.

It’s important to guard your personal and professional content against cyber terrorism.


ESET LogoESET Company has recently published a 69 page report containing the detailed analysis of an ongoing large-scale attack on servers running on Linux, FreeBSD and other Unix-like systems since 2011.

During the attack (the codename ‘Operation Windigo’) a group of cyber criminals has obtained control of more than 25,000 of servers in three years, 10,000 of which were brought down by tones of malware. (more…)

HackersThere are different kinds of cyber criminals. This article discusses 4 types that you should know about.

The internet has truly opened so many doors for everyone. Now, people can do business with ease and communication is so much more convenient too. If you think about it, you can actually do almost anything via the net. Shop, chat, call, play games, organize your work, create your presentations or do your banking online.

Aside from the convenience it offers, the internet is also a fount of so much information. Just Google any topic and a barrage of details will immediately be at your fingertips. Truly, it’s difficult to imagine life without the net. But you shouldn’t become too complacent when using it because the internet has also spawned a number of ingenious criminals that you should be wary of. (more…)

MicrosoftMicrosoft says about the “freeing” of two million computers of botnet Citadel

Microsoft says that earlier this month, the company has blocked the work of a large botnet Citadel, which allowed “to free” about 2 million computers worldwide. Previously, these machines have been infected with malicious software and used to steal more than $ 500 million from bank accounts.

“We definitely liberated more than 2 million PCs worldwide. This is a very conservative estimate,” – said Richard Boscovich, Assistant General Counsel for Microsoft Digita Crimes Unit. “Most of the machines worked in the U.S., Europe and Hong Kong.” (more…)

MicrosoftAs part of a joint operation by Microsoft and the U.S. FBI blocked the work of botnet Citadel, which specialize in the theft of personal information and bank details.

At the same time, Microsoft warned that the size and complexity Citadel such that the operation is not likely to destroy Citadel allow 100%. The company also pointed out that some of the other botnets have been associated with the Citadel and in a joint operation could be affected by other botnets.

Botnets are networks of computers infected with malicious software, which is controlled by cyber-criminals and they are used, as a rule, to send spam, spread viruses, attack other computers and servers, as well as for other types of illegal IT activities for botnet operators. (more…)

DDoS attack alertAccording to experts, companies first need to be able to isolate the attacked components.

After analyzing large DDoS-attacks, which earlier this year underwent many media, as well as a series of attacks on the financial structure of the United States, the responsibility for which has taken over the hacking group Cyber ​​Fighters of Izz ad-din Al Qassam, the experts found that, together with holding major attacks, cyber criminals send out spam messages in some malware. (more…)

information securityComputer security today is as important as personal safety.

We are dealing with computers in offices, banks, shops and houses. With the growing number of so-called computer crime increases and the need for compliance with the rules of computer security.

The present level of development of the various computer technologies into the hands of criminals gave a very powerful and yet simple tool with which “hack” someone’s personal computer is not difficult, even a schoolboy. Therefore, to date computer security is also relevant for the usual and ordinary users.

Who may need my computer? – You ask – it is not a state secret, nor access to billions of dollars. In fact, the “hacked” computer can present a serious threat. For example, attackers can still use your PC for DDoS-attacks – and you know it, your Internet traffic “eat” all the money from the account … (more…)

Zeus Trojan HorseEvolution of Zeus Botnet Part I

Botnet Zeus, perhaps one of the most famous representatives of malware. Zeus started back in 2007 (or 2006) years. Many people mistakenly believe that Zeus – just another Trojan, but it is not. In fact, Zeus is an example of so-called crimeware – software intended to violate any law.

In this case, the main purpose of crimeware Zeus – stealing credentials used for financial transactions. According to analysts, it is responsible for 90% of bank fraud in the world.

Another misconception is the assertion of the existence of a huge botnet Zeus. In reality, Zeus is the basis of a very large number – probably hundreds – of different botnets, and they are all controlled by different gangs of cyber criminals. The creators of Zeus just sell it to interested parties, as they are already using it form their own botnets. Thus, the right to speak not of the botnet Zeus, but of botnets created by Zeus. To track information about team Zeus servers in February 2009, Roman Hussy, a Swiss expert on computer security, created a website ZeusTracker. (more…)

HackersPandaLabs by company Panda Security has discovered a new scam campaign on the Internet.

This new scam is realized through e-mail and well-timed to the start of the season of Christmas sales. The user receives an e-mail claiming to be from a false report of express mail FedEx, by which have been tricked into downloading a computer worm Kuluoz.A and fictitious antivirus program called System Progressive Protection.

“From the beginning of the season of Christmas sales all are looking for gifts for their loved ones and often buy on the Internet. Cyber ​​criminals use this time of year to spread malicious emails designed to trick users and steal their money, “ – says Luis Corrons, Technical Director of PandaLabs.

Spam message looks like it came from the Express Mail FedEx. Message contains a link to download a ‘receipt’ for ‘send’. If the user clicks on the link, it goes to a web page where the downloaded file with a .zip called Postal Receipt. The archive contains an executable file icon Word, loads the worm variant Kuluoz.A., Which, in turn, attempts to connect to a remote server to receive commands from the hacker and perform various malicious actions on the infected computer, including launching files. (more…)