HomeBlogsSecurity Watch

Security Watch

Anatomy of a Botnet

Sometimes pictures help... a lot.Most of you who follow this blog are likely very familiar with the concept of botnets, but, as with the...

Registrars Take Heed of Researchers

Never underestimate the power of one good security research report, as it appears that the ripple effect touched off by KnujOn's phantom domain paper...

Atom Smasher Network Gets Hacked

If you're one of those people of the belief that the much-publicized Large Hadron Collider buried under the border between France and Switzerland could...

The Upside of Spyware

It's not often that you might associate spyware with a positive situation, as typically the programs' impact involves data theft, cyber-stalking or at best...

YouTube Spoofing Program Uncovered

Adding to a spate of recent threats launched via social networking portals and other Web 2.0 sites including MySpace and Facebook, researchers at PandaLabs...

More Cyber-criminals Being Arrested, Prosecuted

Many of us who have been following the cyber-crime scene for a few years have openly griped about the lack of success that law...

Registrar Bends to Pressure from Researchers

The lesson of this story? If you believe in the quality of your work, don't let anyone try to move you off your spot.Over...

Malware Campaign Touts Obama Sex Clip

Well, they went straight for the jugular.You knew there was bound to be plenty of election-themed spam and malware generated during the current U.S....

One Heartfelt Security Solution

You may have seen my blog filed from this year's Black Hat show regarding an interesting demonstration by a pair of researchers about the...

Trojans Still Winning Malware Wars

If it ain't broke, don't fix it.That's what the malware community appears to be saying, as the time-honored Trojan attack model, in all its...