60% of all internet traffic are from bots and half them are out to cause havok.
Researchers from Arbor Networks and IntelCrawler identify new attacks using malware designed for point-of-sale systems.
The suspects used malware to build a botnet, German police said.
So much for the air gap defense.
What's more brazen than a toolbar sucking up your system resources to mine for Bitcoins? A toolbar that announces its plans to hog your CPU in its terms of service agreement.
The purveyors of the Cryptolocker Trojan have lowered their ransom demands in light of the soaring value of their preferred currency, Bitcoins, a security firm reports.
Kaspersky Lab researchers warn that attackers could start to aggressively distribute this malware in the near future.
The security vendor has seen an uptick in infections as well as command-and-control servers.
Security vendor McAfee's research arm, McAfee Labs, has identified growth across four threat trends, including Android-based malware, signed malware, spam, and virtual currencies.
The malware is called i2Ninja and uses the I2P network (also called the darknet) as a command-and-control (C&C) channel, according to security researchers.