The Latest in IT Security

Posts Tagged ‘extortion’

A visual sample of Distributed Denial of Service (DDoS or DoS) attack tools & services compiled by Curt Wilson – Research Analyst, Arbor Networks ASERT There are a variety of popular Denial of Service attack tools that have received a fair amount of attention by the security research community, but there are many other attack […]

Read more ...

Doctor Web’s virus analysts discovered a new Trojan.Winlock modification threatening residents of Arab countries. Trojans horses of this family are widely known in Russia since 2010. Later, Trojan.Winlocks targetting users in other countries appeared. In particular, the recently discovered Trojan.Winlock.5490, operates in systems with French set as the default language. Recent months saw many versions […]

Read more ...

You might think it strange, but the creation of viruses and malware isn't illegal in most jurisdictions. Most virus-writers have been prosecuted on secondary grounds such as unauthorized access or modification, malicious damage and so on. More recent malware authors, botmasters and such may also fall foul of similar issues, or other criminal activities such as fraud or […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments