Tags: botnetRemove, preventionRemove, toRemove

Zeus variant uses encryption to evade detection 
 
Bot masters in cut-throat DDoS fight 
By Darren Pauli | Apr 14, 2014 | Comment Now 
DDoS reaches 300,000 connections a minute.
 
'Pony' botnet used to steal bitcoins 
By Jim Finkle | Feb 25, 2014 | Comment Now 
Full value unknown.
 
DDoS trojan ferrets SMB data 
By Doug Drinkwater | Dec 20, 2013 | Comment Now 
New malware found.
 
Fake Firefox add-on snares users in botnet 
By Adam Greenberg | Dec 17, 2013 | Comment Now 
Infects more than 12,500 PCs.
 
Inside NBN Co's 108Mbps apartment block test 
By Ry Crozier | Dec 17, 2013 | Comment Now 
The technical details.
 
ZeroAccess taken down 
By Adam Greenberg | Dec 9, 2013 | Comment Now 
Microsoft announced on Thursday that its Digital Crimes Unit - in conjunction with the FBI, Europol's EC3 and technology companies such as A10 Networks - has disrupted a botnet ...
 
Whitepaper: Sourcefire Visibility & Control eBook 
Nov 8, 2013 | Comment Now 
The world is split into two groups: those who have been hacked and those who will be
 
Telstra free to make TPG-style basement fibre play 
By Ry Crozier | Oct 23, 2013 | Comment Now 
But little appetite for 'crazy'.
 
NBN Co to start fibre-to-the-basement field trials 
By Ry Crozier | Oct 22, 2013 | Comment Now 
Fresh from the lab to an MDU near you.
 
Feds pounce on $50k-a-month botnet theft ring 
By Adam Greenberg | Sep 18, 2013 | Comment Now 
A 19-year-old Argentinean man was arrested and charged with running a botnet that stole funds from gaming and money transfer sites.
 
Teenager busted for running $50,000-a-month botnet 
By Adam Greenberg | Sep 18, 2013 | Comment Now 
Cops open 'Operation Zombie'.
 
Pushdo spits fake domains at white hats 
By Danielle Walker | Sep 16, 2013 | Comment Now 
Domain generating algo used.
 
Botnet likely behind massive Tor user spike 
By Adam Greenberg | Sep 12, 2013 | Comment Now 
Userbase boomed from 500,000 users to 3.5 million in a month.
 
Botnets 3.0: Global malware 
By Karen Epper Hoffman | Jul 3, 2013 | Comment Now 
Thanks to willing accomplices and easy-to-use technology, the threat from linked computers is expanding.
 
Microsoft defends sinkholing Citadel 
By Dan Raywood | Jun 28, 2013 | Comment Now 
Takedown draws criticism.
 
Citadel falls 
By Dan Kaplan | Jun 7, 2013 | Comment Now 
Botnet down but probably not out.
 
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
 
Beta Bot banking malware surfaces 
By Danielle Walker | May 30, 2013 | Comment Now 
Includes rootkit that blocks security sites.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  68%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 471

Vote