Tags » Malware

Un preocupante aumento en los ataques a sistemas Android

Como todos sabemos Android es seguramente el sistema operativo más utilizado en los teléfonos inteligentes actualmente, debido a eso se vuelve blanco favorito de los ciberdelincuentes para poder atacar a los usuarios y hacerse con datos privados y hasta, información financiera, sea dado conocer en los últimos días ha existido un preocupante aumento a estos sistemas. 189 more words

Tecnologias

Who's spying on Middle Eastern energy companies?

Newly discovered malware is reportedly being used to collect information from targets linked to the gas, helium, and petroleum industries throughout the Middle East.

According to Symantec, Devices affected by the bug were found mostly in the United Arab Emirates, Saudi Arabia, Pakistan, Kuwait, and other countries in the Middle East. 233 more words

Tech

Mitigating Botnet Information Security Risks through EA and the ITSA - Part 3 of 4

Originally Posted Here: http://christopher.killerpenguin.net/blog/Mitigating-Botnet-Information-Security-Risks-through-EA-and-the-ITSA-Part-3

Part III – Case Study: Georgia

During the month of August 2008, the Republic of Georgia imposed a state of war against Russia due to military actions that crossed the demilitarized zone of South Ossetia (Tikk, Kaska, Runnimeri, Kert, Taliharm, & Vihul, 2008). 555 more words

Information Management

Mitigating Botnet Information Security Risks through EA and the ITSA - Part 1 of 4

Originally posted here: Mitigating Botnet Information Security Risks Through EA and the ITSA

Abstract 

 

This paper investigates the threats of botnets to the enterprise environment. First, this paper looks at the history of botnets and the evolution of command and control topologies. 3,695 more words

Information Management

Mitigating Botnet Information Security Risks through EA and the ITSA - Part 4 of 4

Originally Posted Here: http://christopher.killerpenguin.net/blog/Mitigating-Botnet-Information-Security-Risks-through-EA-and-the-ITSA-Part-4

Part IV – Conclusion

In conclusion, botnet activity is a substantial threat to the enterprise environment. With evolving capabilities, botmasters will continue to stay at the cutting edge of technology and devise new ways to avoid detection. 1,002 more words

Information Management

The ABC's of APT

Here at Bromium Labs, we’re always striving to further our knowledge of the rapidly-changing attack landscape that threatens our enterprise customers. Over the past few months, our dedicated team of researchers have collectively developed a severe chemical dependency on caffeine in search of a paradigm to clearly define this landscape in a way that could benefit the security community as a whole. 619 more words

Malware Analysis