ZeroAccess Botnet: Is It Preparing Its Next Attack?

ZeroAccess_header

In December 2013, Microsoft Digital Crimes Unit, Europol, the FBI, and other technology companies sought to take down one of the world’s largest botnets named ZeroAccess (also known as max++ or Sirefef). While the collaboration led to the disruption of ZeroAccess, the takedown was not fully successful as several servers hosting botnet’s command & control (C&C) continued to remain active.

Ever since its discovery several years ago and leading up to 2013, over two million computers globally had been infected. This led to search results from Google, Bing, and Yahoo! being hijacked, which redirected infected users to malicious websites and in turn, impacted the advertising revenue stream on these search providers. In fact, it is estimated that the cost of click fraud, as a result of ZeroAccess, was upwards of $2.7 million each month for online advertisers.
Continue Reading… ZeroAccess Botnet: Is It Preparing Its Next Attack?

Are You Making Yourself a Victim of Cybercrime?

Victim of cybercrime

Did you know some things you do on the Web could actually be putting your PC and personal information in jeopardy? Here are some mistakes and misconceptions that could make you a victim of cybercrime, and what you should do to minimize your risk of becoming part of the statistic.
Continue Reading… Are You Making Yourself a Victim of Cybercrime?

What You Need To Know About Peer-to-Peer File Sharing

P2P sharing on world map

BitTorrent. uTorrent. The Pirate Bay. These are just a few of the many popular peer-to-peer (P2P) file sharing sites you’ve probably heard of. Since its increase in popularity in the late 1990s, P2P file sharing has had its fair share of backlash for enabling illegal activity. Run a Google News search on peer-to-peer file sharing, and you’d find headlines like:

“Barre man charged with promoting child pornography.”

“Is the free download of uTorrent legal?”

“Illegal downloaders in federal court’s crosshairs.”

There’s another aspect to P2P that has traditionally caused concern: computer security and privacy risks. Continue Reading… What You Need To Know About Peer-to-Peer File Sharing

8 Signs Your PC Might Be A Zombie

ZOMBIE SIGNS 1_header

Zombies are making a killing on TV (The Walking Dead), in movies (World War Z), and in books (Pride and Prejudice and Zombies). There’s even a zombie game/fitness app, Zombies, Run!

But zombies aren’t so entertaining if your computer becomes one.
Continue Reading… 8 Signs Your PC Might Be A Zombie

Weak Passwords: Are You Making It Too Easy For Criminals?

weak passwords_header

The password to your online account is like the key to your front door. How strong are your passwords? We’ll address some troubling facts about weak passwords and what you can do to make them stronger.
Continue Reading… Weak Passwords: Are You Making It Too Easy For Criminals?