Seculert believes the cloud is the best way to get the realtime information about infections in your system.
Wordpress is currently the target of a botnet attack stealing access to admin accounts. The purpose? Likely to make the botnet stronger.
A new botnet attacking display advertisers is able to mimic humans so as to fly under the radar of bot-watching algorithms.
Guest Post We all know we’ve got a cyber security problem. But while new attack vectors like BYOD and the cloud are making things tougher, there might be a reason for optimism.
Symantec and McAfee need to stop focusing on anti-virus software and start solving bigger problems or they run the risk of becoming obsolete, says KPCB’s Ted Schlein.
The U.S. Department of Homeland Security believes you shouldn’t be using Java until an update has been issued to fix a dangerous hole.
It sucks when your PC gets clogged with viruses, slows to crawl, and generally makes your life miserable. But what if it put your life in danger? With medical facilities all around the United States running outdated software that can’t install new security patches, that very well may become the case.
Sometimes it’s hard to imagine just how contagious a botnet can be, and then sometimes you see them from space. Security researchers at F-Secure created this look at ZeroAccess botnet infections today, across the United States and the world.
On Friday of last week, U.S Marshalls entered office buildings in Pennsylvania and Illinois that are believed to be home to some of the biggest botnet armies on the web. But the law enforcement was just backup for the real investigators, Microsoft, who had secured a warrant from a federal judge to gather evidence and deactivate servers used by the criminals to infect people’s computers and harvest their personal data.
Philippe Courtot, chief executive of compliance software maker Qualys, launched the Trustworthy Internet Movement last night, pledging $500,000 of his own funds to integrate security into the product-making process.
Botnets have been taking down web sites for years by overwhelming sites with too much traffic. But now the swarms of compromised computers are being unleashed for the first time on an old kind of vulnerability: Google Dorks.
The number of exploitable options in computer programs grew by 36 percent in 2010, largely a result of the increased prevalence of Web apps and looming cloud-computing security threats, according to IBM’s X-force security report released Thursday.