Usual Threats, But More Sophisticated and Faster: Report
Almost Every Type of Cyber Attack is Increasing in Both Volume and Sophistication Eight new malware samples were recorded every second during the final three months of 2017. The use of fileless attacks, primarily via PowerShell, grew; and there was a surge in cryptocurrency hijacking malware. These were the primary threats outlined in the latest […] more…Necurs Botnet Leads the World in Sending Spam Traffic
In Q4 2017 we found that the Necurs and Gamut botnets comprised 97% of spam botnet traffic. (See the McAfee Labs Threats Report, March 2018.) Necurs (at 60%) is currently the world’s largest spam botnet. The infected computers operate in a peer-to-peer model, with limited communication between the nodes and the control servers. Cybercriminals can […] more…‘McAfee Labs Threats Report’ Examines Cryptocurrency Hijacking, Ransomware, Fileless Malware
Today McAfee published the McAfee Labs Threats Report: March 2018. The report looks into the growth and trends of new malware, ransomware, and other threats in Q4 2017. McAfee Labs saw on average eight new threat samples per second, and the increasing use of fileless malware attacks leveraging Microsoft PowerShell. The Q4 spike in Bitcoin […] more…A Year of Spam: The Notable Trends of 2013
2013 was a year of change inthe spam landscape. The volume of spam increased from 2012. We witnessed the decline of a previously-successful exploit kit. The old became new again, thanks to different techniques used by spammers. While we still saw traditional types of spam, we also saw several “improvements” which allowed spammers to avoid […] more…More information
- States Push Back Against Use of Facial Recognition by Police
- The Jeep hackers return to ditch a car going 60 mph
- The ‘Broadband Gap’ Is Now a Housing Problem
- Google confirms critical Android crypto flaw used in $5,700 Bitcoin heist
- Microsoft Visio Viewer VSD File Format CVE-2013-0079 Remote Code Execution Vulnerability
- Persistent XSS via CSRF in WP Meta and Date Remover
- Taiwan: A canary in the cyber coalmine
- Preventing WebCobra Malware From Slithering Onto Your System
- 4 reasons BadBIOS isn’t real
- Pollock Hub site Network Equipment Rack Replacement