Geeks
162.4K views | +0 today
Follow
Geeks
Geeks
Informatique Geek Portable Tablette Mobile Camera Appareil Photo   Français Anglais
Curated by 694028
Your new post is loading...
Your new post is loading...
Rescooped by 694028 from ICT Security-Sécurité PC et Internet
Scoop.it!

New malware sets up anonymous proxies on infected PCs | CyberSecurity

New malware sets up anonymous proxies on infected PCs | CyberSecurity | Geeks | Scoop.it
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.



Via Gust MEES
Gust MEES's curator insight, December 30, 2015 2:31 PM
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.

Rescooped by 694028 from Propriété Intellectuelle et Numérique
Scoop.it!

USA : Utiliser un malware pour défendre la propriété intellectuelle

USA : Utiliser un malware pour défendre la propriété intellectuelle | Geeks | Scoop.it

'Les moyens de défense contre le piratage passeraient-ils par... le piratage ? Une scandaleuse commission baptisée Commission on the Theft of American Intellectual Property, vient de rendre un rapport de 84 pages qui fait pousser des cris d'effroi. Il semble que les élus du peuple soient devenus fous, au point de vouloir introduire le loup dans la bergerie, pour tenter d'en déloger le renard...'


Via Pascale_Masson
Pascale_Masson's curator insight, May 27, 2013 5:06 PM

partagé via Sandrine Rouja j'mjv

Rescooped by 694028 from Propriété Intellectuelle et Numérique
Scoop.it!

Logiciels malveillants : le vecteur lucratif de la cybercriminalité | Kenza Adeïda

Logiciels malveillants : le vecteur lucratif de la cybercriminalité | Kenza Adeïda | Geeks | Scoop.it
Nations, consommateurs et entreprises sont victimes de la prévalence des logiciels malveillants. Un rapport met aujourd’hui en lumière le lien entre ceux-ci et les organisations criminelles.

Via Pascale_Masson
No comment yet.