Modern botnets are using social engineering tactics to trick the user into unwillingly installing malicious code on their computer.
A botnet may be small or large, depending on the complexity of malware running on the infected machines.
This weeks e-threat activity seems to have focused on a couple of ActiveX control exploits that spread malware unhindered.
The pattern is known from years and years of similar experiences: A security researcher publishes an exploitable flaw in software or announces the vendor(s)...
Exploits target specific vulnerabilities in the software running on a system.
After last weeks appearances in the Storm Worm world, we have found new threats emerging on the same storyline.
The Bagle worm is a piece of malware that spreads by itself over email, disk drives and network shares. It has rootkit capabilities that enable it to hide from...
System administrators whose boxes are running on Linux have recently reported a massive wave of attacks on the famous SSH port (also known as Port 22).
We will define an e-threat as being a general term for any type of threat, be it malware, spyware, adware, grayware, hacktool and so on.