Botnet operators hide C&Cs in the Tor network

Botnet operators hide C&Cs in the Tor network


Botnet operators hide C&Cs in the Tor network

Posted: 12 Sep 2012 11:19 AM PDT

Over the years, botnet owners have tried out different tactics for keeping their C&C servers online, in contact with the zombie computers, and hidden from researchers and law enforcement agencies, ...

Chip and PIN payment card system vulnerable to "pre-play" attacks

Posted: 12 Sep 2012 06:45 AM PDT

The chip and PIN system employed by most European and Asian banks is definitely more secure than the magnetic strip one, but it doesn't mean that it doesn't have its flaws. It can routinely be misused...

French energy company targeted with faulty malware

Posted: 12 Sep 2012 05:33 AM PDT

A researcher of Norwegian security firm Norman has recently come across and analyzed a peculiar malware sample that was likely aimed at compromising computers of employees of AREVA, a French conglomer...

Cyber security strengthened at EU institutions

Posted: 12 Sep 2012 04:32 AM PDT

EU institutions have reinforced their fight against cyber threats by establishing the EU's Computer Emergency Response Team, or CERT-EU, on a permanent basis. This decision follows a successful one-ye...

Full keynote lineup announced for RSA Conference Europe 2012

Posted: 12 Sep 2012 03:53 AM PDT

RSA Conference announced its complete line-up of keynote speakers for the 13th annual RSA Conference Europe, taking place from 9th -11th October 2012, at the Hilton London Metropole Hotel, U.K. RSA...

The QR code: A new frontier in mobile attackability

Posted: 12 Sep 2012 03:35 AM PDT

A single poisoned link is all it takes to expose an entire organization to a full-scale attack. Hackers write sophisticated browser-based attacks that operate quite stealthily. Now, they're going a...

Etsy starts its own bug bounty program

Posted: 12 Sep 2012 03:17 AM PDT

Etsy, the popular online marketplace for handcrafted and vintage goods, has announced its own bug bounty program, which will reward researchers with money and goods for information about bugs. "The...

Every third computer in North America attacked while online

Posted: 12 Sep 2012 01:57 AM PDT

An in-depth analysis of the nature of cybercrime in North America and Western Europe in the first six months of 2012 by Kaspersky Lab found that the computers of 33.4% of Internet users in Western Eur...

Splunk App for PCI Compliance 2.0 released

Posted: 12 Sep 2012 01:30 AM PDT

Splunk announced the general availability of the Splunk App for PCI Compliance 2.0. The app is for any organization looking for a simple, intuitive reporting and analysis solution that satisfies the r...

Microsoft releases System Center 2012 Configuration Manager SP1 beta

Posted: 12 Sep 2012 01:06 AM PDT

The beta of Configuration Manager Service Pack 1 is now available for download on the Microsoft Download Center. One of the great new benefits of this platform are Windows 8 apps, and ConfigMgr 2...

Cloud-connected backup and recovery platform

Posted: 12 Sep 2012 01:06 AM PDT

EVault updated its cloud-connected backup and recovery platform. EVault 7 offers a more resilient architecture, with enhanced replication that delivers faster backups – up to 100 percent faster for VM...

WD unveils thinnest 2.5-inch hybrid hard drive

Posted: 12 Sep 2012 01:06 AM PDT

WD announced it is sampling a 5mm-thin hard disk drive featuring hybrid technology. WD has developed hard drives slim enough for integration into today's thinnest notebook PCs, which provide high-capa...

Windows Server 2012 Pocket Consultant

Posted: 12 Sep 2012 01:05 AM PDT

Portable and precise, this pocket-sized guide delivers ready answers for the day-to-day administration of Windows Server 2012. Zero in on core operations and daily tasks using quick-reference tables, ...

0 comments:

Post a Comment