Malware


431 articles

Malware

Library of Congress Acquires Entire Twitter Archive

Library of Congress Acquires Entire Twitter Archive

Malware

Library of Congress Acquires Entire Twitter Archive

Since the feed will be public and historic, there is a potential to research trends over the timeline, particularly as twitter is being used for more command and control functionality. As soon as it becomes available, we’ll follow up. :)

ESET Research25 May 2010


Malware

Bricking your cell phone: Mayhem on a Massive Scale

Bricking your cell phone: Mayhem on a Massive Scale

Malware

Bricking your cell phone: Mayhem on a Massive Scale

What would happen if every single one of the four BILLION cell phones on this planet just went dark? Or most likely, what would happen if every single cell phone went dark in one country? One scenario is a combined DoS attack on the internet was combined with a DoS attack on the cellular phone infrastructure at the same time.

ESET Research24 May 2010


Digital Security, Malware, Cybercrime

Continued Malware Hijinks with Mass Webserver Compromises

Continued Malware Hijinks with Mass Webserver Compromises

Digital Security, Malware, Cybercrime

Continued Malware Hijinks with Mass Webserver Compromises

While the jury’s still out about whether the intent of the past month’s mass webserver breaches are fully criminal, Dancho reports new developments which also link Koobface activity into this command and control structure: Yet another mass sites compromise is currently taking place, this time targeting DreamHost customers, courtesy of the same gang behind the U.S Treasury/GoDaddy/NetworkSolutions mass compromise campaigns.

ESET Research12 May 2010


Digital Security, Malware, Cybercrime

Malware Injection Campaign: A Retaliation?

Malware Injection Campaign: A Retaliation?

Digital Security, Malware, Cybercrime

Malware Injection Campaign: A Retaliation?

ESET Research06 May 2010


Malware

There’s Nothing of Value on My Computer

There’s Nothing of Value on My Computer

Malware

There’s Nothing of Value on My Computer

ESET Research20 Apr 2010


Malware

Insider Threat: Malware on your ATM

Insider Threat: Malware on your ATM

Malware

Insider Threat: Malware on your ATM

ESET Research12 Apr 2010


Malware, Scams

No Stone Left Unturned

No Stone Left Unturned

Malware, Scams

No Stone Left Unturned

Aryeh Goretsky07 Apr 2010


Malware, Mobile Security

Get Your Motor Running

Get Your Motor Running

Malware, Mobile Security

Get Your Motor Running

ESET Research15 Mar 2010


Malware

Malvertising

Malvertising

Malware

Malvertising

ESET Research06 Jan 2010