The difficulties in sizing up botnets

The difficulties in sizing up botnets


The difficulties in sizing up botnets

Posted: 03 May 2012 11:51 AM PDT

The main metric with which security researchers identify how effective and disruptive specific botnets are is the number of computers they consists of. Estimating their size allows them to asses...

RedKit exploit kit spotted in the wild

Posted: 03 May 2012 09:57 AM PDT

A new exploit kit that Trustwave researchers have spotted being used in the wild is aiming to enter a market that is practically monopolized by the widely famous BlackHole and Phoenix exploit kits. ...

"Free additional storage" phishing emails doing rounds

Posted: 03 May 2012 05:05 AM PDT

Symantec researchers warn about a variety of fake emails supposedly coming from popular email and online storage services, offering "storage quota upgrades". A click on the offered link takes the p...

Android drive-by download malware served by hacked websites

Posted: 03 May 2012 04:11 AM PDT

A number of legitimate but compromised websites have been spotted serving Android malware to unsuspecting visitors, warns Lookout. The downloading of the malware, which poses as a system update,...

Location-based apps thrive despite privacy concerns

Posted: 03 May 2012 02:00 AM PDT

Fifty-eight percent of consumers who have a smart device use location-based applications, despite concerns about safety and third-party use of their personal information for marketing purposes, accord...

Autorun-based threats account for 12% of global infections

Posted: 03 May 2012 01:48 AM PDT

Bitdefender announced that more than four years after Autorun was eliminated from operating systems, worms that take advantage of the antiquated feature account for more than one of every ten computer...

ISO 27001 benefits: How to obtain management support

Posted: 03 May 2012 01:21 AM PDT

As with any other project, if you do not ensure enough money and human resources, your ISO 27001 project will fail. Therefore, the only way to get those is to get your management buy-in. If you w...

50% of businesses feel the cloud is too risky

Posted: 03 May 2012 12:30 AM PDT

Despite the apparent enthusiasm around cloud computing, a Wisegate survey revealed that over 50% believe the cloud is too risky for prime time, and only suitable for commodity applications like CRM or...

Child ID theft epidemic continues to spread

Posted: 02 May 2012 11:30 PM PDT

The epidemic of child identity theft revealed last year is continuing to grow. 10.7% of the nearly 27,000 children in the study are victims of identity theft, 35 times higher than adults in the same p...

Users feel insecure on social media sites

Posted: 02 May 2012 10:03 PM PDT

More than four out of five users worry about their personal information being stolen or misused on social media sites such as Facebook, Google+ and Twitter, according to Avira. The survey revealed tha...

Audited way to reset or unlock domain account passwords

Posted: 02 May 2012 09:36 PM PDT

Lieberman Software released Account Reset Console 6.0, which permits delegated users to reset their own passwords and unlock their own accounts without involving IT staff, helping organizations mainta...

Identity as a Service platform for cloud service providers

Posted: 02 May 2012 09:01 PM PDT

Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly integrate identity and access ...

0 comments:

Post a Comment