2010 – Year of the Zombie Cloud?
2009 has been a notable year for malware and malicious online activity for a number of reasons and several of them relate to what is known as botnets. A zombie, or a bot, is a PC infected by malware...
View ArticlePerimeter Inadequacies
While enterprises typically have robust perimeter security such as firewalls and network Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS), malware occasionally slips through to...
View ArticleGood Clouds, Evil Clouds: Why Microsoft Hasn’t Lost Yet in Cloud Computing
In a recent eWeek interview, Citrix CTO Simon Crosby described Conficker malware as “the world’s largest cloud.” He’s right. Cybercriminals use Conficker to create massive clouds of remotely-controlled...
View ArticleNew type of cloud emerges: Exploits as a Service (EaaS)
For years now, if you knew where to shop on the shady side of the Internet cloud, you could pick up a botnet for cheap. But it was so much work to log in to IRC and pay with egold that a busy...
View ArticleAmbient Cloud News: Skype protocol has been reverse engineered
This is pretty cool. I gave a talk last week at the Glue Conference in Denver about how ambient clouds ( http://cloud.trendmicro.com/good-clouds-evil-clouds-why-microsoft-has… )work and even used Skype...
View ArticleThis Week in Security News: Botnets and Breaches
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, North Korean hackers overtook Adobe, Trend...
View ArticleThis Week in Security News: Banks and Botnets
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the FBI warned U.S. banks of a wide-scale...
View Article