Around the beginning of May, malware targeting the Mac OS X platform hit the web. By the end of June, the bad guys behind the attack seemingly called it a day and the Mac Defender malware (and variants on the original) vanished from the web.
Early this month, Microsoft declared that ”government snooping potentially now constitutes an ‘advanced persistent threat,’” a statement that became ironic this weekend, given that, early this month, Microsoft likened government surveillance to “sophisticated malware and cyber attacks.”
New NSA revelations out this weekend detailed precisely how the NSA’s
Australia’s financial, transactional and global IT security colossus, TrustDefender, warns that while 2010 was “the year of cybercrime”, 2011 will see the trend get worse – and more specific – as the “year of malware attacks”. Take cover!
Bromium has released its first software product — a micro virtual machine (micro-vm) that traps malware and analyzes it for IT administrators to examine once an attack takes place.
Bromium is a startup that is banking on disrupting the enterprise security market. Though it has the technical capabilities to isolate attacks, its weakness is in the breadth of the market it can cover.
I've been having DNS amplification attacks for a few days on my dns server (fedora 19). I usually block when I see these attacks from my firewall but the person who is doing that is trying so hard by changing different IPs. I cannot sit in front of my computer and check these attacks every moment so I am trying to find a solution to automate this task.