@Botnet
Botnet Attacks Witnessed Steady Rise In India In 2016: Fortinet
by Priyanka Pugaokar    May 10, 2017
Category : News & Analysis
Vulnerable IT systems remained a prime target of botnet attackers, says Fortinet
Forcepoint's Threat Report Reveals “Jaku” Botnet Targeting Asia
by CXOtoday News Desk    Apr 29, 2016
Category : News & Analysis
The annual report published by the company highlights threat campaign, examines shifts in attacker tools, tactics and processes
Clickfraud Malware, Gateway To Bigger Cyber Threats
by CXOtoday News Desk    Jun 29, 2015
Category : News & Analysis
Once the first clickfraud campaign is over, the botnet operators will sell the machine to another criminal group.
India third most targeted country by phishing: report
by CXOtoday News Desk    Dec 27, 2012
Category : News & Analysis
Among Top 5 countries targeted by phishing attacks by brands this November
Android Malware Heating Up: Symantec
by CXOtoday Staff    Mar 03, 2011
Category : Columns
Android., like other Android Trojans is spreading via altered versions of legitimate apps hosted on unregulated third-party Android marketplaces
India is the second largest spam relaying country in the world
by CXOtoday Staff    Oct 14, 2010
Category : News & Analysis
One in 20 spam messages are sent from India
Rise of ransomware and do-it-yourself botnets
by Sharon Lobo    Sep 02, 2010
Category : News & Analysis
Ransomware variant TotalSecurity has made a big comeback since March
New tools enable Twitter controlled botnets
by CXOtoday Staff    May 18, 2010
Category : News & Analysis
BitDefender has released an emergency update to protect against a potential pandemic caused by the emergence of a botnet self-development kit controllable via the popular social media service Twitter. In order to create their custom bot, an...
Service and Application-Layer Attacks On Top
by CXOtoday Staff    Jan 21, 2010
Category : News & Analysis
Arbor Networks' Fifth Annual Infrastructure Security Report provides data useful to network operators to make more informed decisions about the use of network security technology mechanisms to protect mission-critical Internet and other...
PAGE: 1