Monday, April 7th, 2008
A new botnet twice the size of Storm has ballooned to an army of over 400,000 bots, including machines in the Fortune 500, according to botnet researchers at Damballa.
The so-called Kraken botnet has been spotted in at least 50 Fortune 500 companies and is undetectable in over 80 percent of ...
Posted in Networking, Privacy, Security | No Comments
Monday, April 7th, 2008
Storm has once again turned its eye to the blogging community, specifically the Blogspot.com community.
Several blogger sites with random or very quirky names have been sporting a love theme, Storm style. These sites appear to have been created solely for Storm's purposes and no legitimate blogger site has of yet ...
Posted in Coding, Internet, Privacy, Security | No Comments
Sunday, April 6th, 2008
Spyware authors have ramped up their malicious code to invade users' privacy at unprecedented levels. The following list describes some of the most malicious activities of today's spyware, illustrating the need for solid antispyware defenses.
Changing network settings: To prevent signature updates for antivirus and antispyware tools, some spyware alters the ...
Posted in Coding, Internet, Privacy, Security | No Comments
Friday, April 4th, 2008
We have been noticing quite a few malware samples having references to or communicating with Google's SMTP servers. This post dissects one of these samples and in the process attempts to illustrate to the reader some reversing techniques and information gathering techniques, while explaining the behavior and impact of this ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments
Wednesday, April 2nd, 2008
The amount of new malware has never been higher. Our labs are receiving an average of 25,000 malware samples every day, seven days a week. If this trend continues, the total number of viruses and Trojans will pass the one million mark by the end of 2008.
While there are more ...
Posted in Internet, Security | No Comments