Results for "conficker"

April 30, 2020 - Could a recession brought on by the current COVID-19 pandemic cause an increase in cybercrime? Did cybercrime increase during the recession of 2009? Or is this just too complex a subject to pin down one way or the other?

CONTINUE READING No Comments

March 16, 2020 - On episode 2 of Lock and Code, we discuss the latest security news, including how to secure remote workers, security conferences cancelled because of coronavirus, and Google Play's poor performance on stopping malware. Plus, we speak to two MSP representatives on the daily challenges of managing thousands of endpoints.

CONTINUE READING No Comments

December 6, 2016 - Domain Generating Algorithms are in use by cyber criminals to prevent their servers from being blacklisted or taken down. The algorithm produces random looking domain names. The idea is that two machines using the same algorithm will contact the same domain at a given time.

CONTINUE READING No Comments

November 28, 2016 - A compilation of notable security news and blog posts from the 20th of November to the 26th. This week, we talked about PrincessLocker, ransomware decryptors, malvertising on the Mac, and the Windows Firewall.

CONTINUE READING No Comments

Worm

A computer worm is a type of Trojan that is capable of propagating or replicating itself from one system to another. It can do this in a number of ways. Unlike viruses, worms don’t need a host file to latch onto. After arriving and executing on a target system, it can do a number of malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting files, and consuming bandwidth.

CONTINUE READING No Comments

Botnets

Botnets are networks of computers infected by a botnet agent that are under hidden control of a third party. They are used to execute various commands ordered by the attacker. Most common uses of botnets are criminal operations that require distributed resources, such as DDoS attacks on selected targets, spam campaigns, and performing click fraud. Often, the botnet agent is ordered to download and install additional payloads or to steal data from the local computer.

From the moment of infection, botnet agents keep in touch with their remote Command-and-Control server (C&C). The communication can be carried by various means, and cybercriminals keep on inventing in new methods to hide their data transmission channels. There have been some unusual ways via social media like Twitter or reddit to send commands. However, the most common implementation of the C&C is a web-application, contacted by the client via simple HTTP requests.

CONTINUE READING No Comments

February 9, 2016 - Today is the 12th Safer Internet Day (SID), and the message remains: we must take security seriously.

CONTINUE READING No Comments

November 23, 2015 - A compilation of notable security news and blog posts from November 15 to 21.

CONTINUE READING No Comments

February 6, 2015 - Botnets were used to take down Xbox and Playstation's network during the holidays. But did you know that botnets were originally designed to be helpful? Learn more about botnets.

CONTINUE READING No Comments

CONTINUE READING No Comments

Select your language