Tag "Botnet"

Back to homepage
Software

Valentine’s Day malware surge is a test of corporate email defences

It may be a day for love and for lovers, but Valentine’s Day is also living up to expectations as a magnet for cybercriminal activity.Advising of an ongoing dating-spam campaign

Software

Is Investing in Cryptocurrency Worth the Security Threats?

Even people who aren’t familiar with investing have heard of cryptocurrency — especially lately since it has frequently made headlines.Some of those news stories about digital currencies focus on the

Hardware/Network

IoTroop botnet: How to protect yourself from the cyber-storm of the century

The IoTroop botnet, which shares an extensive code base with the leaked Mirai source code, stands to cause even more damage than its predecessor.Almost one year ago exactly, computers across

Mobile

Android devices roped into new Monero-mining botnet

A new Monero-mining bot sprang up a few days ago and, in just a few days, has created a botnet consisting of over 7,000 Android devices, most of which are

Mobile

ADB.Miner, the Android mining botnet that targets devices with ADB interface open

Security researchers at Qihoo 360’s Netlab have spotted a new Android mining botnet over the weekend. The malicious code ADB.Miner targets Android devices by scanning for open ADB debugging interface

Hardware/Network

Defending our public services from the DDoS of Things

It has been described by the government as “the second digital revolution” and received £32m in funding to promote its benefits and development across the UK, so it’s no surprise

Identity Theft

The new gold rush: A look inside cryptocurrency fraud

Cybercriminals are flooding to the new world of cryptocurrencies looking to exploit the boom in interest and adoption of these electronic currencies, according to Digital Shadows. This new gold rush

Software

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.Defined

Industry Insights

Top Cybersecurity Training Priorities

With new legislation coming into play in 2018 and the constant onslaught of ever-changing threats, it can be hard to determine where one should concentrate cyber efforts. As CSOs head into

Identity Theft

Satori variant hacks into mining rigs, steals ETH by replacing wallet address

Qihoo 360 Netlab researchers warn about a new variant of the Satori malware that apparently goes after ether (ETH) mining rigs.The malware, dubbed Satori.Coin.Robber, started to reestablish the Satori botnet