Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.

The operation, dubbed AdGholas, has been running since at least October 2015. According to security vendor Proofpoint, the gang behind it managed to distribute malicious advertisements through more than 100 ad exchanges, attracting between 1 million and 5 million page hits per day.

The Proofpoint researchers estimate that 10 to 20 percent of computers that loaded the rogue ads were redirected to servers hosting exploit kits — web-based attack tools that attempt to silently exploit vulnerabilities in popular applications in order to install malware.

To read this article in full or to leave a comment, please click here


RSS-5

You’ll love watching lectures on YouTube with this Chrome extension


While it’s great that many universities are actively embracing the internet and making lectures available on the Web for everyone to tune in to, watching them online can be a hassle – especially when you want to make notes. This is where BriefTube comes in. Available on Chrome, it’s an extension for YouTube that aims to aid online learning by automatically creating concise tables of contents for the lectures you watch. Once you open a lecture on YouTube, the nifty summary tool will generate a table of contents, breaking down the lecture in chapters and sub-chapters that you can quickly skip forward to. To access the feature, simply open a…

This story continues at The Next Web


Uncategorized

CIOs: Shadow IT Is Actually Great for Your Cloud Strategy

In a survey, cloud security broker vendor CipherCloud found that 86 percent of cloud applications used at workplaces are unsanctioned. That’s a pretty big percentage. Obviously, the security vendors have an incentive to raise such fears about shadow IT, so take this claim with much salt. However, the issue merits attention.

I don’t see shadow IT as that big of deal. Moreover, I believe that CIOs can embrace, rather than fight, the rise of shadow IT for their own benefit. How?

There are three benefits to the CIO from departments’ shadow cloud use.

To read this article in full or to leave a comment, please click here

Network World Cloud Computing

Related Posts:

RSS-5

RSS-5


RSS-3