Geeks
162.5K views | +0 today
Follow
Geeks
Geeks
Informatique Geek Portable Tablette Mobile Camera Appareil Photo   Français Anglais
Curated by 694028
Your new post is loading...
Your new post is loading...
Rescooped by 694028 from ICT Security-Sécurité PC et Internet
Scoop.it!

New malware sets up anonymous proxies on infected PCs | CyberSecurity

New malware sets up anonymous proxies on infected PCs | CyberSecurity | Geeks | Scoop.it
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.



Via Gust MEES
Gust MEES's curator insight, December 30, 2015 2:31 PM
ProxyBack stealthily uses your bandwidth to route traffic from a shady Russian proxy seller. ...


For as long as people have been doing productive things with software, there have been jerks making malware to screw things up and make money. As security gets better, the malware has gotten smarter over the years. Some modern variants like ransomware are pretty clever, but Palo Alto Networks has just reported discovery of something new. ProxyBack sets up anonymous proxies on infected PCs to route traffic over the victim’s connection.


There is demand for proxy connections in various countries, for both legitimate and non-legitimate uses. When ProxyBack managed to infiltrate a system (probably via deceptive software downloads), it goes to work setting up a reverse tunnel on the machine. This allows ProxyBack to circumvent security measures like software and hardware firewalls that prevent the flow of data.

Rescooped by 694028 from Medic'All Maps
Scoop.it!

Comment et pourquoi utiliser des infographies dans vos présentations

Comment et pourquoi utiliser des infographies dans vos présentations | Geeks | Scoop.it
Souvent, des personnes me demandent pourquoi elles devraient ajouter des infographies ou des graphiques dans leurs présentations.  Et si oui, comment le faire de façon adéquate.  Voici quelques conseils sur « comment et pourquoi utiliser des infographies dans vos présentations ». Avertissement : Ce texte est l'adaptation française d'un article en anglais publié sur le site d'Infogram.  Infogram…

Via Jean-Pierre THELEN
Corinne RAMILLON's curator insight, March 13, 2016 11:06 AM

Comment et pourquoi utiliser des infographies dans vos présentations