Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

Image Gallery: April's cyber threat landscape

1 of 15 NEXT PREV
  • 418802.jpg

    According to a research released by Google, scareware now accounts for 15% of all the malware that the company is detecting. The true scale of the problem is, however, much more disturbing since the cybercriminals behind these campaigns have been actively tricking search engines' crawlers for a few years now. Read the original article: Google: Scareware accounts for 15 percent of all malware

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418803.jpg

    This professionally looking window of a ransomware known as the ICPP copyright violation alert, has affected a huge number of Internet users, using propagation tactics already in use by scareware. The scam required the user to pay $400, perhaps the largest amount of money ever requested for this type of scams. Read the original article: Copyright violation alert ransomware in the wild

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418804.jpg

    The sample payment page, where the end user is provided with a bogus bill for his/her copyright infringement activities. Read the original article: Copyright violation alert ransomware in the wild

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418805.jpg

    Upon successful infection, the wallpaper on the end user's PC is changed to the following wallpaper. Read the original article: Copyright violation alert ransomware in the wild

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418806.png

    With a huge number of people still affected with the scam, the single most effective way of removing it, is by entering a working license code/key. Read the original article: How to remove the ICPP Copyright Violation Alert ransomware

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418807.png

    Once the license code is entered, the ransomware executes uninstall.exe, which completely removes it from the end user's PC. Read the original article: How to remove the ICPP Copyright Violation Alert ransomware

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418808.png

    What’s more devastating than a DDoS attack launched by a botnet? In some cases, that’s the DDoS attack launched by the “opt-in botnet” aggregated through a crowdsourcing campaign. Photo courtesy of Damballa. Read the original article: Attack of the Opt-In Botnets

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418809.jpg

    This DIY DoS (Denial of Service Attack) tool, showcases the "workstation" of a potential participant in a opt-in/crowdsourcing driven botnet campaign. Read the original article: Attack of the Opt-In Botnets

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418810.png

    Cybercriminals are actively multitasking these days. For instance, visiting the page of this phishing campaign, will load a tiny IFRAME, which will then attempt to launch client-side exploits against the end user. Read the original article: Facebook phishing campaign serving ZeuS crimeware

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418811.jpg

    This DIY DoS (Denial of Service Attack) tool, was released by Chinese hacktivists in their successful campaign to attack and take down CNN.com Read the original article: Attack of the Opt-In Botnets

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418812.png

    Intego reported on a newly discovered sample of a Mac OS X malware first detected in 2004. The source code, including a DIY manual for the configuration of the malware, are already distributed across cybecrime-friendly online communities. Read the original article: New Mac OS X malware variant spotted

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418813.png

    A MarkMonitor review of the adoption of VeriSign’s Registry Lock Service launched at the beginning of the year, shows that less than 10% of the top 300 most highly trafficked sites were protected using it. Graph courtesy of MarkMonitor for ZDNet. Read the original article: Hundreds of high profile sites unprotected from domain hijacking

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418814.jpg

    Security researchers from the Information Warfare Monitor (Citizen Lab and SecDev) released the “Shadows in the Cloud” report. Photo courtesy of Citizen Lab/SecDev and the ShadowServer Foundation. Read the original article: Researchers expose complex cyber espionage network

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418815.png

    What's the driving force behind the growth of cybercrime? DIY ZeuS crimeware kits and outdated Adobe vulnerabilities, according to Symantec's report. Photo courtesy of Symantec. Read the original article: Report: ZeuS crimeware kit, malicious PDFs drive growth of cybercrime

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

  • 418816.png

    The ZeuS crimeware ecosystem remains in tact, despite the minor disruption seen in this chart. Photo courtesy of the ZeusTracker. Read the original article: Report: ZeuS crimeware kit, malicious PDFs drive growth of cybercrime

    Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

    Caption by: Dancho Danchev

1 of 15 NEXT PREV
  • 418802.jpg
  • 418803.jpg
  • 418804.jpg
  • 418805.jpg
  • 418806.png
  • 418807.png
  • 418808.png
  • 418809.jpg
  • 418810.png
  • 418811.jpg
  • 418812.png
  • 418813.png
  • 418814.jpg
  • 418815.png
  • 418816.png

Facebook phishing campaigns serving ZeuS crimeware, new Mac OS X malware variant, yet another cyber espionage network exposed, next to several reports detailing Opt-In botnets and how outdated vulnerabilities drive the growth of cybercrime - April, 2010 was a busy month for the security community.

Read More Read Less

According to a research released by Google, scareware now accounts for 15% of all the malware that the company is detecting. The true scale of the problem is, however, much more disturbing since the cybercriminals behind these campaigns have been actively tricking search engines' crawlers for a few years now. Read the original article: Google: Scareware accounts for 15 percent of all malware

Published: April 29, 2010 -- 08:37 GMT (01:37 PDT)

Caption by: Dancho Danchev

1 of 15 NEXT PREV

Related Topics:

Enterprise Software Apple Cloud Big Data Analytics Innovation Tech and Work
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • Best Google Chrome extensions (February 2019 edition)

    If you are a Google Chrome user then you can give your productivity and performance a boost by equipping their browser with the right extensions. (Updated February 2019) ...

  • Hottest tech jobs, biggest tech companies and the future of food: Research round-up

    Facts and figures from the past month in technology news.

  • Top Google Chrome extensions (2019 edition)

    Google Chrome users can give their productivity and performance a boost by equipping their browser with the right extensions. (Updated January 2019)

  • Best Google Chrome extensions for productivity, security, and performance (2018 edition)

    Here is a selection of Google Chrome extensions aimed specifically at boosting your productivity, performance, and privacy. (Updated December 2018)

  • How to speed up Google Chrome and make the browser use less RAM

    Here are a handful of tricks to help you speed up your browser and make it use up fewer precious system resources. (Updated October 2018)

  • Windows 10 October 2018 Update: The new features that matter most

    Windows 10 version 1809, officially the October 2018 Update,started rolling out October 2. Here are some of the new capabilities you can expect in this surprisingly feature-packed ...

  • Slack tips and tricks: Master the art of workplace collaboration

    Slack is a hugely popular collaboration tool used by many -- from remote workers to large-scale enterprises -- including CBSi. But it's more than just a chat app; it's powerful and ...

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums