How to Ensure Your Home Router Has the Latest Security Updates

Monday, December 22nd, 2014

Keeping your home router updated is a crucial part of staying secure. Shellshock affected a number of routers, and we’ve also seen routers hacked and turned into botnets. Home router security is notoriously poor. You should ensure your router is getting security updates, too. Depending on your router, you may have to do this ...

Hackers Are Using Reddit to Connect 17,000 Macs to a Botnet

Saturday, October 4th, 2014

Bad news for Mac users: You're at risk for an insidious malware that will connect your computer to a botnet. Hackers have developed a backdoor entry called "Mac.BackDoor.iWorm" that gains access to Macs and uses Reddit to connect the hacked computer with a command server. Once the computer is infected, the ...

ISPs urged to quarantine infected computers

Tuesday, June 3rd, 2014

The recent effort to disrupt the Gameover Zeus botnet includes plans for Internet service providers to notify victims, but some security researchers think ISPs should play an even bigger role in the future by actively quarantining infected computers identified on their networks. Law enforcement agencies from several countries including the FBI ...

U.S. Leads Multi-National Action Against “Gameover Zeus” Botnet and “Cryptolocker” Ransomware, Charges Botnet Administrator

Monday, June 2nd, 2014

The Justice Department today announced a multi-national effort to disrupt the Gameover Zeus Botnet – a global network of infected victim computers used by cyber criminals to steal millions of dollars from businesses and consumers – and unsealed criminal charges in Pittsburgh, Pennsylvania, and Omaha, Nebraska, against an administrator of ...

Researchers discover credential-stealing Unix-based server botnet

Wednesday, March 19th, 2014

Dubbed Operation Windigo, the attack has been ongoing for more than two and a half years and has compromised as many as 25,000 servers at one time, anti-virus vendor ESET said Tuesday. Systems infected with the backdoor Trojan are used in stealing credentials, redirecting Web traffic to malicious content and ...