Archive | Malware

Advertisements


01 November 2006 | 5,903 views

Hackers Target Home Users for Cash

Hackers are switching targets now, companies are getting too hard to break into due to the availability of decently configured perimeter kit like firewalls and IDS. Plus the information they do get if they manage to break in is often worthless commercially and really not worth the effort. So instead, they target the end user, […]

Continue Reading


30 October 2006 | 7,104 views

Anti-Spyware Groups Still Require Legislation

Cyber and computer laws are always a grey area, they tend to be very vague and don’t cover specific technologies. Spam is a good example, look at how long we’ve been getting spammed, and it’s been a SERIOUS problem for at least the last 5 years, spam legislation has only started coming in to effect […]

Continue Reading


16 October 2006 | 9,925 views

zCodec Video Codec is a TROJAN

For those that didn’t see, there is a new all singing all dancing ‘light-weight’ Codec in town that is actually a trojan. Indeed it’s not the first time we’ve seen this kind of thing. The zCodec software actually messes with your DNS settings. Users looking for the latest and greatest video software may not just […]

Continue Reading


14 September 2006 | 16,599 views

Impressive Open Source Intrusion Prevention – HLBR

It’s good to see work on open source tools in the countermeasure department aswell as the attack and penetration arena. It’s a shame since Snort and Nessus have gone semi-commercial. I hope more people invest their time in good IDS, Firewall and IPS systems, I love things like IPCop and hope to see more products […]

Continue Reading


12 September 2006 | 13,399 views

Moving Ahead in the War Against Botnets

This effort started quite a long time ago, I was just checking up to see how they were getting on, but there’s not much news of their progress. perating under the theory that if you kill the head, the body will follow, a group of high-profile security researchers is ramping up efforts to find and […]

Continue Reading


10 September 2006 | 4,826 views

What Responsibility do Anti-Spyware Researchers Have?

Ethical debates are always interesting, and people have gotten in trouble lately for reverse engineering and various other branches of research. This is a fairly old topic, but as I’m clearing out some old drafts, I still find it an interesting one. There’s been an ongoing debate in security circles concerning how security researchers should […]

Continue Reading


06 September 2006 | 5,879 views

Charity Computers May Fuel Malware Wars

Sometimes doing good can help bad things propagate, sometimes it’s good to consider the big picture and the repercussions of your charitable actions. This is a case where such logic rings true. Programs to send PCs to third world countries might inadvertently fuel the development of malware for hire scams, an anti-virus guru warns. Eugene […]

Continue Reading


27 August 2006 | 15,660 views

Sophos Offers Free Rootkit Detection Tool/Software

Ah, here at Darknet we have always been a fan of Sophos and the way they operate, a very efficient company and good to see good technical products still coming out of the UK! Another good move by them, they have decided to offer a free rootkit detection tool called Sophos Anti-Rootkit..Yah I know, not […]

Continue Reading


17 August 2006 | 4,868 views

Bot Herders Go After MS06-40 Exploit

Malware herders are speeding up, the first wave is already here for MS06-40. It’s basically a variant of some old malware suited to the new vulnerability. Same old story then, same packer, technique, new exploit. Same as the days of autorooters. It’s basically the Mocbot trojan that was used in the Zotob worm attack in […]

Continue Reading


02 August 2006 | 14,344 views

Firefox Extension Spyware – FormSpy

The antivirus specialists at McAfee have warned of a Trojan that disguises itself as a Firefox extension. The trojan installs itself as a Firefox extension, presenting itself as a legitimate existing extension called numberedlinks. It then begins intercepting passwords and credit card numbers entered into the browser, which it then sends to an external server. […]

Continue Reading


Advertisements