Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43426
  • Total Topics: 16523
  • Online today: 2717
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2713
Total: 2714









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 05. June 2012., 18:17:21 »

Quote
...the United States was the primary source of SQL-injection attacks and cross-site scripting attacks...

My comment is mostly motivated with this part "primary source"... it's not logical (at least for me ;D).


Quote
Their is even a site to site owners to test if their site is working in China.
http://www.websitepulse.com/help/testtools.china-test.html

By the way, SCforum is available behind "The Great Firewall of China": http://www.greatfirewallofchina.org/index.php?siteurl=http%3A%2F%2Fscforum.info

:bih:
Posted by: Pez
« on: 05. June 2012., 09:30:42 »

Could it be simply that it is Russia and China that do the attack. ;)
I don't know.

But regarding China it can be that thy lock them self behind the language barrier with their special character set and that the government in China have more and less all Internet users locked behind their new Firewall (GrateWall).
http://en.wikipedia.org/wiki/Internet_censorship_in_the_People's_Republic_of_China
http://en.wikipedia.org/wiki/Chinese_wall
http://www.bbc.com/news/technology-17910953

I suppose that Firewall can work in both way.

Their is even a site to site owners to test if their site is working in China.
http://www.websitepulse.com/help/testtools.china-test.html

Regarding Russia then thy internally use the Cyrillic alphabet and that more and less protect everything internal in Russia due to the alphabet set.
http://en.wikipedia.org/wiki/Cyrillic_script

The main reason that US is one of the main country's to attack is probably because of more and less every one with some kind of higher knowledge of computer's also have the English language someware in their education. So that is probably the reason.

So mainly the reason is to many hackers can English and to few can Chinese and Russian.
And off cause the most OS is based on English but not everything is working on a foreign language computer. If you using a English computer and do get a message unexpectedly in Chines to push OK would you do that?

This is compaired also with the different scam letters sending around the world. As fast as the letter is sent to a foreign language then English then it is match easier to see that thy have done a bad translation to that language and of en from English to a foreign language.

So if thy get attacked in Russia or China their is probably professional and educated attackers due to the language and then you probably have a international crises insted.

Then because of their two country's is in some way closed thy probably don't tell the outer world so match about their internal trouble. Probably also the effect if some one get court in those country's the effect is a whole different than in the Western world.
Posted by: Samker
« on: 03. June 2012., 07:38:17 »

...

United States the Primary Source of Cyberattacks


A compromised machine is often used as a proxy for spam, botnets, denial of service, or other types of malicious activities. These machines can be located anywhere in the world, but this quarter many were located in the United States. Based on data collected from the McAfee Global Threat Intelligence™ network, the United States was the primary source of SQL-injection attacks and cross-site scripting attacks, and also had the highest number of victims of both attacks. The United States currently houses the most botnet control servers, and the location point for the vast majority of new malicious websites, with an average of 9,000 new bad sites recorded per day.

...

USA ???

WTF, where is China, Russia... ?
Posted by: Pez
« on: 30. May 2012., 08:34:39 »


McAfee Labs Threat Report for Q1 2012: Threats Gone Wild

McAfee Labs has just released the McAfee Threats Report, First Quarter 2012 , and I’m proud of it. I am cribbing from the intro to this quarter’s report, but it kinda says it all:

“The Greek philosopher Heraclitus, known for his doctrine of change as central to the universe, once wrote that ‘everything flows, nothing stands still.’ The first quarter of 2012 embodies Heraclitus’ doctrine in almost all areas of the threats landscape. Although we observed declines in many areas in the numbers of malware and threats at the end of 2011, this quarter is almost its polar opposite.

PC malware had its busiest quarter in recent history, and mobile malware also increased at a huge rate.

We saw growth in established rootkits as well as the emergence of several new families. Many of the familiar malware we analyze and combat rebounded this quarter, but none more so than password-stealing Trojans. In this edition of the Threats Report we introduce our tracking of new threats such as

the ZeroAccess rootkit and signed malware.”

Malicious code is on the rise again. Plain and simple. We are seeing more malware than in the recent past and you can count on that figure to rise in the coming year. In particular, mobile platforms present today’s cybercriminal with an almost irresistible target, specifically Android-based for now, but that can certainly evolve. Some highlights of the report include:

Mobile Malware Explosion

Mobile malware raced up a significant incline during the quarter, with 8,000 total mobile malware samples collected. This large increase was due in part to McAfee Labs’ advancements in the detection and accumulation of mobile malware samples.

Financial profit is one of the main motivators for spreading malware on the Android platform, as identified by McAfee Labs malware researcher Carlos Castillo in a recent blog post. Nearly 7,000 Android threats have been collected and identified through the end of the quarter, a more than 1,200 percent increase compared with the 600 Android samples collected by the end of the last quarter of 2011. Most of these threats stem from third-party app markets, and are typically not found in the official Android market.

Malware Increase in PCs and Macs

By the end of 2011, McAfee Labs collected more than 75 million malware samples. This quarter had the largest number of PC malware detected in the last four years. This increase brought the grand total to 83 million pieces of malware samples by the end of the period, up from 75 million samples at the end of 2011. Major contributors to the total were strong increases in rootkits, a stealth form of malware, as well as password stealers, which reached approximately 1 million new samples this quarter. Email continued to be a medium used for highly targeted attacks, and nearly all targeted attacks began with a spear phish.

As the Flashback Trojan began to wreak havoc among Apple Mac users in March, Mac malware had already been growing at a consistent rate. Despite the growth, Mac malware is still significantly less prevalent than PC malware, with approximately 250 new Mac malware samples, and approximately 150 new Mac fake antivirus malware samples in this period.

Spam Low, Botnets High

Global spam levels dropped to slightly more than 1 trillion monthly spam messages by the end of March. Decreases were most significant in Brazil, Indonesia, and Russia, while increases in spam were found in China, Germany, Poland, Spain, and the United Kingdom.

Botnet growth increased this quarter, reaching nearly 5 million infections at its highest point. Columbia, Japan, Poland, Spain, and the United States were areas with the largest botnet increase, while Indonesia, Portugal, and South Korea were regions that continued to decline. The most prevalent botnet of the quarter was Cutwail, with more than 2 million new infections.

The McAfee Labs report depicts the price breakdown for a botnet sold on the black market. Citadel, a Zeus variant and financial botnet, will cost a cybercriminal US$2,399 plus $125 for “rent” of a botnet builder and administration panel, with an extra $395 for automatic updates for antivirus evasion. For Darkness, by SVAS/Noncenz, a distributed denial of service botnet, options range from $450 for a minimal package to approximately $1,000 for more advanced offerings.

United States the Primary Source of Cyberattacks

A compromised machine is often used as a proxy for spam, botnets, denial of service, or other types of malicious activities. These machines can be located anywhere in the world, but this quarter many were located in the United States. Based on data collected from the McAfee Global Threat Intelligence™ network, the United States was the primary source of SQL-injection attacks and cross-site scripting attacks, and also had the highest number of victims of both attacks. The United States currently houses the most botnet control servers, and the location point for the vast majority of new malicious websites, with an average of 9,000 new bad sites recorded per day.


Download the McAfee Threats Report here.


Orginal atricle:Wednesday, May 23, 2012 at 12:09pm by David Marcus

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023