42 Results for

SecureWorks

Article

Hacker swipes $83,000 from Bitcoin mining pools

Bitcoin exchanges and trading posts have been hacking targets over the past year, but now one hacker has taken on ISPs to loot cryptocurrency from mining pools.

By August 8, 2014

Article

Shylock malware gets stung by law enforcement

Police and security firms team up to take down the notorious Shylock, a dangerous financial Trojan that has infected at least 30,000 Windows computers worldwide.

By July 11, 2014

Article

Cybercrooks use DDoS attacks to mask theft of banks' millions

Analyst says three unidentified US banks have been hit with "low powered" DDoS attacks to cover fraudulent wire transfers.

By August 21, 2013

Article

Comfoo cyberspy campaign still active

The Trojan used in the RSA breach of 2010 continues to target corporations and governments worldwide. Over 200 variants were recently discovered by researchers.

By August 2, 2013

Article

Dell to acquire SecureWorks

The computer maker plans to use SecureWorks' security-as-a-service applications--managed security, risk consulting, and threat intelligence--to bolster its software lineup.

By January 4, 2011

Article

Microsoft, Symantec shutter another botnet

Symantec and Microsoft join forces to stop a botnet, and for the first time they provide clean-up tools directly to people with infected computers.

By February 6, 2013

Article

Cyberspying effort drops 'Mirage' on energy firms

Malware targets individuals at organizations in Philippines, Taiwan, Canada and elsewhere via "spear-phishing" e-mails bearing tainted PDF files.

By September 20, 2012

Article

Watching the crooks: Researcher monitors cyber-espionage ring

Good guys are keeping an eye on large espionage and botnet campaigns that are stealing corporate secrets from government and private industry and money from peoples' bank accounts.

By July 25, 2012

Article

Dell ponies up $2.4B to buy Quest Software

Dell wins a bidding war for Quest and now builds out its software unit with an eye on everything from identity management to data center tools to database administration.

By July 2, 2012

Article

110,000 PC-strong Kelihos botnet sidelined

Researchers use specially crafted code to direct infected computers to their servers instead of servers run by the criminals who have been using the botnet to distribute spam.

By March 28, 2012