Tags: botnetRemove, byoRemove

Zeus variant uses encryption to evade detection 
 
Bot masters in cut-throat DDoS fight 
By Darren Pauli | Apr 14, 2014 | Comment Now 
DDoS reaches 300,000 connections a minute.
 
'Pony' botnet used to steal bitcoins 
By Jim Finkle | Feb 25, 2014 | Comment Now 
Full value unknown.
 
DDoS trojan ferrets SMB data 
By Doug Drinkwater | Dec 20, 2013 | Comment Now 
New malware found.
 
Fake Firefox add-on snares users in botnet 
By Adam Greenberg | Dec 17, 2013 | Comment Now 
Infects more than 12,500 PCs.
 
ZeroAccess taken down 
By Adam Greenberg | Dec 9, 2013 | Comment Now 
Microsoft announced on Thursday that its Digital Crimes Unit - in conjunction with the FBI, Europol's EC3 and technology companies such as A10 Networks - has disrupted a botnet ...
 
NSW allows BYO devices into public schools 
By Allie Coyne | Nov 29, 2013 | Comment Now 
Policy document sets clear expectations for admins, students.
 
Feds pounce on $50k-a-month botnet theft ring 
By Adam Greenberg | Sep 18, 2013 | Comment Now 
A 19-year-old Argentinean man was arrested and charged with running a botnet that stole funds from gaming and money transfer sites.
 
Teenager busted for running $50,000-a-month botnet 
By Adam Greenberg | Sep 18, 2013 | Comment Now 
Cops open 'Operation Zombie'.
 
Pushdo spits fake domains at white hats 
By Danielle Walker | Sep 16, 2013 | Comment Now 
Domain generating algo used.
 
Botnet likely behind massive Tor user spike 
By Adam Greenberg | Sep 12, 2013 | Comment Now 
Userbase boomed from 500,000 users to 3.5 million in a month.
 
Botnets 3.0: Global malware 
By Karen Epper Hoffman | Jul 3, 2013 | Comment Now 
Thanks to willing accomplices and easy-to-use technology, the threat from linked computers is expanding.
 
Microsoft defends sinkholing Citadel 
By Dan Raywood | Jun 28, 2013 | Comment Now 
Takedown draws criticism.
 
Citadel falls 
By Dan Kaplan | Jun 7, 2013 | Comment Now 
Botnet down but probably not out.
 
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Beta Bot banking malware surfaces 
By Danielle Walker | May 30, 2013 | Comment Now 
Includes rootkit that blocks security sites.
 
Pushdo revived with domain-generator algo 
By Danielle Walker | May 20, 2013 | Comment Now 
Command and control concealed.
 
SpyEye trojan developer extradited to US 
By Dan Kaplan | May 8, 2013 | Comment Now 
One of the masterminds behind the pernicious SpyEye banking trojan has been extradited to the United States, where he will face charges for computer and wire fraud.
 
Mobile upgrade for NSW Govt agencies 
By Allie Coyne | May 3, 2013 | Comment Now 
New shared service incoming.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  2%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 736

Vote