Home Tags IP Address

Tag: IP Address

Dridex: A History of Evolution

In the several years that the Dridex family has existed, there have been numerous unsuccessful attempts to block the botnetrsquo;s activity.

The ongoing evolution of the malware demonstrates that the cybercriminals are not about to bid farewell to their brainchild, which is providing them with a steady revenue stream.

IT threat evolution Q1 2017. Statistics

According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world.

File antivirus detected a total of 174,989,956 unique malicious and potentially unwanted objects.

Anglophiles: Hang up your VPN; iPlayer isn’t for you anymore

BBC collects IP address, location, e-mail address in fight against online cheats.

DDOS attacks in Q1 2017

Although the first quarter of 2017 was rather quiet compared to the previous reporting period, there were a few interesting developments.

Despite the growing popularity of IoT botnets, Windows-based bots accounted for 59.81% of all attacks. Meanwhile, complex attacks that can only be repelled with sophisticated protection mechanisms are becoming more frequent.

Creator of infamous Playpen website sentenced to 30 years in prison

FBI: Playpen takedown resulted in hundreds of US-based arrests, even more overseas.

Cisco TelePresence ICMP Denial of Service Vulnerability

A vulnerability in the ICMP ingress packet processing of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause the TelePresence endpoint to reload unexpectedly, resulting i...

DDoS attacks abusing exposed LDAP servers on the rise

Each DDoS (distributed denial-of-service) attack seem to be larger than the last, and recent advisories from Akamai and Ixia indicate that attackers are stepping up their game.

As attackers expand their arsenal of reflection methods to target CLDAP ...

Unraveling the Lamberts Toolkit

The Lamberts is a family of sophisticated attack tools that has been used by one or multiple threat actors against high-profile victims since at least 2008.

The arsenal includes network-driven backdoors, several generations of modular backdoors, harvesting tools, and wipers.

Feds deliver fatal blow to botnet that menaced world for 7...

Alleged Kelihos kingpin arrested while his family traveled from Russia to Spain.

Twitch unleashes scorched-earth attack to unveil malicious spambot creator

PayPal, CloudFlare, Shaw, and Whois “are involved” in attacks, Twitch claims.

Downloads of VPN-equipped Opera browser double after Congress revokes Internet privacy...

Opera Software today boasted that the number of new U.S. users of its namesake browser more than doubled days after Congress voted to repeal restrictions on broadband providers eager to sell customers' surfing history.Opera debuted a VPN -- virtual private network -- a year ago, and finalized the feature in September.

A VPN disguises the actual IP address of the user, effectively anonymizing the browsing, and encrypts the data transmitted to and from sites, creating a secure "tunnel" to the destination.[ Also on InfoWorld: Want privacy? Congress says you'll have to pay for it. |  Read 'em and weep: 5 ways your ISP is screwing you. | 5 more ways your ISP is screwing you. | Cut to the key news in technology trends and IT breakthroughs with the InfoWorld Daily newsletter, our summary of the top tech happenings. ]By using a VPN, U.S. users block their Internet service providers (ISPs) from recording their online activity.To read this article in full or to leave a comment, please click here

To keep classified docs from WikiLeaks secret, DOJ drops 2 child...

Judge: Feds relied on timestamp metadata, but withheld exploit code.