Botnet

Lizard Squad Turns Their Sights on Malaysia Airlines

After taking down the online networks of Xbox Live and PlayStation for a number of days during the holidays, the Lizard Squad started spreading advertisements for their a’la carte DDoS service that could be rented out by the hour, day, or week depending on how much cash you had to drop on a for-hire botnet. Read More

Fox IT

23,000 Websites at Risk of Backdoor CryptoPHP Threat

Just before everyone headed home for Thanksgiving break last week, researchers at the Netherlands-based digital forensics lab Fox IT posted a whitepaper which detailed the results of their investigation into a bug that could affect over 23,000 websites that use the WordPress, Joomla, and Drupal publication platforms to host their own content.

NotCompatible

NotCompatible Malware Next Big Threat for Enterprise

According to a new report released by the mobile software developer Lookout Security, the NotCompatible malware could be the next big threat for enterprise providers in 2015. Though the original build is going on several years old now, the freshest entry, known as NotCompatible.C, has evolved into a beast of infectious proportions that mimics some Read More

keyloggers

More Limitless Keyloggers Now Available ‘Off the Shelf’

Trend Micro’s new research paper sheds light on Limitless and Predator Pain keyloggers, unscrupulous but effective tools that scammers are increasingly making use of. According to Ryan Flores, senior threat researcher, more of these remote access tools are “simple, off-the-shell” offerings that are used to commit email fraud in corporations on a significant scale. The Read More

wifi

Darkhotel Targets High Level Executives Through Hotel Wi-Fi

A group of sophisticated cyber criminals has compromised the Wi-Fi networks of luxury hotels for the past few years to launch malicious attacks against business people in the Asia-Pacific region. Researchers from Kaspersky Lab dubbed the cyber-espionage group as ‘Darkhotel’ and tell us that it operates by injecting malicious codes into the Web portals used Read More

Older Posts