Attackers are constantly changing their tactics and adapting to what the security community and researchers are doing, and it’s not unusual for the bad guys to adopt techniques used by their adversaries. The latest example of this is a malware gang that has deployed what amounts to a honeypot designed to monitor the activity of […]
Tags:
Attackers,
Honeypots,
Researchers,
Using
There’s a new flaw in all of the current versions of Internet Explorer that is being used in some targeted attacks right now. Microsoft has confirmed the bug and said it is working on a fix, but has no timeline for the patch release yet. The company did not rule out an emergency out-of-band patch, […]
Tags:
Attacks,
Explorer,
internet,
Targeted
The IT security industry is no stranger to urban myths: stories that spread and, over time, become accepted as general truths. Global IT vendor Panda Security has been asking its community, mainly through Facebook and Twitter, which myths come to mind when talking about antivirus companies, and below we look at the top five answers.
Tags:
myths,
Security
Back in 2007, the Burmese government reportedly severed the country’s Internet links in a crackdown over growing political unrest. Yesterday, Burma once again fell off the Internet. Over the last several days, a rapidly escalating, large-scale DDoS has targeted Burma’s main Internet provider, the Ministry of Post and Telecommunication (MPT), disrupting most network traffic in […]