Symantec Sinkholes ZeroAccess Botnet

With more than 1.9 million computers infected the ZeroAccess botnet is second only to the Conficker in the number of hosts it has infected. The unique feature of the ZeroAccess botnet is that it uses a peer-to-peer command-and-control architecture. Most botnets can be brought down by purging the C&C server. Since ZeroAccess has no C&C…

Criminals Exploit Obama Care

In just two days the Affordable Care Act goes into effect and criminals are exploiting the online signup process by putting up fake enrollment sites. Due to lack of adequate publicity and education provided by President Obama’s administration the U.S. public is confused about where to go and what to do in order to take…

FTC Targets Patent Assertion Entities

The Federal Trade Commission will be gathering studying on 25 Patent Assertion Entities (“PAEs”). The FTC intends wants to better understand how PAEs operate. The FTC’s primary concerns how PAEs impact innovation and competition. One of the FTC’s missions is to see how competition and consumer protection effect the U.S. economy. PAEs are firms who…

Cisco Patches 10 IOS Vulnerabilities

Cisco IOS software has 10 vulnerabilities making it susceptible to Denial of Service (DOS) attacks. Yesterday Cisco released patches to fix all 10 issues. The problem exists in Cisco IOS executions of the Network Time Protocol (NTP), the Internet Key Exchange protocol, the Dynamic Host Configuration Protocol (DHCP), the Resource Reservation Protocol (RSVP), the virtual…

Napolar Infections On The Rise

The malware listed by ESET and Avast called Napolar can perform distributed denial-of-service attacks, act as a reverse SOCKS5 proxy, steal POP3 and FTP login credentials from email and FTP clients, and steal information entered into Web forms that appear in Internet Explorer, Mozilla Firefox or Google Chrome. Reports of this malware are on the…

Spammers Impersonate The FBI

In a press release today through the Internet Crime Complaint Center the FBI warned that internet fraud schemes continue to send spam email using the names and titles of FBI officials. Targets receive emails informing them they have received large sums of money. The schemes vary but the method has not changed. The most recent…

China Cracks Their Internet Ban

The South China Morning Post announced that the Chinese government is lifting its ban on foreign websites they consider politically sensitive, but only in the 17 square mile Shanghai Free Trade Zone. Currently attempts to access Facebook, Twitter and other sites on the ban list from within China return in an error message: “Network Timeout.”…

New York Attorney General Fines 19 SEO Companies

On September 23rd the New York Attorney General Eric T. Schneiderman announced that 19 companies agreed to stop writing fake online reviews. The companies are paying more than $350,000 in penalties. In what the N.Y AG’s office is calling “Operation Clean Turf,” they companies flooded the Internet with fake consumer reviews on websites such as…

What is a Virus?

The most commonly referred to malicious software is a computer virus. Viruses reproduce replicas of themselves infecting files, programs or sectors of your disk. Viruses perform malicious activities such as: block off your hard drive reducing available space; take up CPU time just to slow down your computer; corrupt data thus ruining files; displaying unwanted…