Information security digest, 18.10-18.11
DDoS attack without head… A powerful and very unusual DDoS attack was discovered in mid-October. The attack was unusual in that it employed a version of the Phantom JS headless
238 articles
DDoS attack without head… A powerful and very unusual DDoS attack was discovered in mid-October. The attack was unusual in that it employed a version of the Phantom JS headless
Ransomware in general is not exactly the nastiest malware out there, but a new variant – called CryptoLocker – is particularly worrisome because it actually does what most ransomware merely
Internet Explorer vulnerabilities In the second half of September Microsoft announced the discovery of a more serious vulnerability (CVE-2013-3893 ) and a zero day exploit for it. The vulnerability is
On the night of June 5, 2013 a coalition led by the FBI and Microsoft broke up a botnet of two million connected PCs that was being used by cybercriminals
Security professionals and enthusiasts are aware of rootkits, but general audiences typically don’t know about this kind of malware, which is specifically designed to hide itself and its activity in
Botnets are large networks of PCs infected with a specific kind of malware. Learn more on how to protect your devices from this type of malware.
Kaspersky Lab experts have discovered a new trojan virus attacking skype users. Find out how to recognize it before you fall victim.