Geeks
Follow
Find tag "Cybersecurity"
137.3K views | +72 today
Geeks
Geeks
Informatique Geek Portable Tablette Mobile Camera Appareil Photo   Français Anglais
Curated by 694028
Your new post is loading...
Your new post is loading...
Rescooped by 694028 from Veille & Tic
Scoop.it!

New malware sets up anonymous proxies on infected PCs | CyberSecurity

New malware sets up anonymous proxies on infected PCs | CyberSecurity | Geeks | Scoop.it
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.



Via Gust MEES, awbc
more...
Gust MEES's curator insight, December 30, 2015 2:31 PM
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.

Rescooped by 694028 from "#Google+, +1, Facebook, Twitter, Scoop, Foursquare, Empire Avenue, Klout and more"
Scoop.it!

Facebook logins aren't being properly protected on iPhones, iPads and Android devices

Facebook logins aren't being properly protected on iPhones, iPads and Android devices | Geeks | Scoop.it
Facebook login credentials could be lifted from smartphones because the site is not encrypting the sensitive data on iOS and Android devices.

Via Gust MEES, ABroaderView
more...
No comment yet.
Rescooped by 694028 from Propriété Intellectuelle et Numérique
Scoop.it!

Your Medical Data Is Worth More on the Black Market Than Financial Data I Shirley Li

Your Medical Data Is Worth More on the Black Market Than Financial Data I Shirley Li | Geeks | Scoop.it
The health industry is not immune to cyberattacks.

Via Pascale_Masson
more...
No comment yet.
Rescooped by 694028 from Best Freeware Software
Scoop.it!

Wireless Network Watcher - Show who is connected to your wireless network

Wireless Network Watcher - Show who is connected to your wireless network | Geeks | Scoop.it
scans your wireless network and displays the list of all computers and devices that are currently connected to your network.

Via Gust MEES
more...
No comment yet.