Symantec blog: The Truth Behind the Shady RAT

August 12, 2011

Upon closer inspection of the file and the Trojan code, we can see that there are commands hidden in the image using steganography. These commands are totally invisible to the human eye, since the bits representing the commands are mathematically built into the data representing the image.

link


Microsoft Offers Reward of $250,000 for Information on Rustock botnet

August 12, 2011

After publishing notices in two Russian newspapers last month to notify the Rustock operators of the civil lawsuit, Microsoft decided to augment their civil discovery efforts to identify those responsible for controlling the notorious Rustock botnet by issuing a monetary reward in the amount of $250,000 for new information that results in the identification, arrest and criminal conviction of such individual(s).

Link

 


Chinese Regime Suspected of Cyber Attacks on Taiwan’s Opposition Party

August 12, 2011

Taiwan’s opposition party is calling for the government to pay more attention to cyber security. It comes after revelations that the email accounts of its senior staff have been hacked by China’s Communist regime.

Link