Feeds & Podcasts

Blogs

Archive

Tags

#SecChat $1 million guarantee 12 Scams of Christmas access to live fraud resolution agents Acquisition Alex Thurber Android antivirus Apple botnet Channel Partners cloud security Compliance Consumer counter identity theft credit card fraud and protection credit fraud alerts credit monitoring credit monitoring and resolution critical infrastructure Cyber Security Mom cyberbullying Cybercrime cybermom data breach data center data center security Data Protection Dave DeWalt DLP Email & Web Security embedded encryption Endpoint Protection enterprise facebook fake anti-virus software Family Safety global threat intelligence google government Hacktivism how to talk to kids how to talk to teens identity fraud identity fraud scams identity protection identity protection $1 million guarantee identity protection fraud identity protection surveillance identity surveillance identity theft identity theft expert identity theft fraud identity theft protection identity theft protection product Identity thieves and cybercriminals intel iphone kids online behavior lost wallet protection malware McAfee McAfee Channel McAfee Family Protection McAfee Identity Protection McAfee Initiative to Fight Cybercrime McAfee Labs McAfee security products Mid-Market Mobile mobile security monitor credit and personal information Network Security online personal data protection online safety Operation Aurora PCI personal identity theft fraud personal information loss personal information protection phishing privacy proactive identity protection proactive identity surveillance Public Sector restore credit and personal identity Risk and Compliance scam scams scareware security smartphones social media social networking social networks spam Stuxnet twitter vulnerability Web 2.0 work with victim restore identity

botnet

Posts tagged under botnet

Satanbot Employs VBScript to Create Botnet

Friday, October 21, 2011 at 4:04pm by Carlos Castillo
Carlos Castillo

Malware is on the rise. At the beginning of 2008, our malware collection had 10 million samples. Today we have already surpassed 70 million. Most of the malicious samples are Trojans (backdoors, downloaders, fake alerts), but there are also a lot of viruses, worms, and bots that in a short time can infect many computers Read more…

Tags: , , , ,

Taking a Look at Both Sides of Bitcoin

Wednesday, September 28, 2011 at 1:08pm by Francois Paget
Francois Paget

Bitcoin, developed in 2009 and based on the works of Satoshi Nakamoto, is a peer-to-peer (P2P) currency system created in open-source C++ programming code. Its inventor describes it as a purely peer-to-peer version of electronic cash that allows online payments to be sent directly from one party to another without going through a financial institution. Read more…

Tags: , , , , ,

Botnets Demystified and Simplified

Wednesday, June 1, 2011 at 10:26pm by David Marcus
David Marcus

Let’s face it: Most people–even folks in the security industry–have a hard time explaining botnets (robot networks of infected computers) in a way that your Uncle Joe or Aunt Betty can understand. Is it really a big deal? Yes, it is. With the rapid growth in malware and bot infections we’re seeing, it’s important for Read more…

Tags: , , , , , , , , , , , , ,

I Smell a RAT: Java Botnet Found in the Wild

Wednesday, May 4, 2011 at 4:12pm by Carlos Castillo
Carlos Castillo

Most of today’s malware works on Windows and its apps, because it can affect a lot of people around the world. However, other platforms are becoming more popular every day and attracting bad guys who are starting to create malicious code for other systems. (For a few examples, see BlackHoleRAT, HellRaiser RAT, and a fake-alert Read more…

Tags: , , , , ,

Fluffy Bunnies Spam Is No Easter Egg

Tuesday, April 19, 2011 at 9:46am by Tracy Mooney
Tracy Mooney

Fluffy bunnies, cute chicks, Easter eggs… Does that sound dangerous to you? You wouldn’t think it was dangerous by the looks of it. It is so sweet I would just want to download it and send it on to a few dozen of my friends. This looks sweet, does it not? The subject line says Read more…

Tags: , , , , , , , ,

Easter Bunny Delivers Basket of Malware

Monday, April 18, 2011 at 3:09pm by Consumer Threat Alerts
Consumer Threat Alerts

Avoid clicking on links and images in malware-laden emails, McAfee warns Computer users around the world received phony Easter greetings with links to malware on Monday, according to research by McAfee Labs™. Cybercrooks often take advantage of current events to grab computer users’ attention, and this time they are using the upcoming Christian holiday to Read more…

Tags: , , , , , , , ,

Easter Greeting Hatches Nasty Malware Surprise

Monday, April 18, 2011 at 10:39am by Joris Evers
Joris Evers

Cybercrooks always latch on to current events to lure unsuspecting Internet users into their traps. It doesn’t matter what type of event it is, a natural disaster, major sporting championship or, in today’s case, Easter, the upcoming Christian holiday. This morning I received an e-mail (see below) with a colorful picture of a bunny, some Read more…

Tags: , , , , , , ,

Malware in Recent Korean DDoS Attacks Destroys Systems

Monday, March 7, 2011 at 3:53pm by Georg Wicherski
Georg Wicherski

There has been quite a bit of news recently about distributed denial of services (DDoS) attacks against a number of South Korean websites. About 40 sites– including the Presidential, National Intelligence Service, Foreign Ministry, Defense Ministry, and the National Assembly–were targeted over the weekend, beginning around March 4 at 10 a.m. Korean time. These assaults Read more…

Tags: , , , , , , , , , , ,

Malware Rises, Zeus Goes Mobile, Stuxnet Confuses in Recent Quarter

Thursday, November 18, 2010 at 3:19pm by David Marcus
David Marcus

Looking at computer threats from quarter to quarter remains a busy experience for us at McAfee Labs. Through the first three quarters of the year we have analyzed and cataloged more threats than in all other years combined, and the growth in both volume and sophistication of malware and attacks shows no signs of slowing. Read more…

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,