Google: Cyber criminals use IP cloaking to circumvent security

Stuart Sumner
clock • 1 min read

Report exposes how malware authors evade cyber security techniques

Malware authors are increasingly using a technique known as IP cloaking to trick security programmes into allowing users to be infected by their malicious software. This is one of the findings o...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Google urges UK tribunal to dismiss mass lawsuit over alleged online ad dominance

Compliance

Claims are 'incoherent,' argue the company's lawyers

clock 09 May 2024 • 2 min read
Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Threats and Risks

Cornell researchers created worm 'to serve as a whistleblower'

clock 01 May 2024 • 3 min read
Microsoft, Google and Snap report strong quarterly results, IBM and Intel less so

Finance and Reporting

Microsoft and Google see AI investments bearing fruit

clock 26 April 2024 • 4 min read

More on Threats and Risks

Russian network found using genAI to spread disinformation

Russian network found using genAI to spread disinformation

CopyCop aims to fuel discord and weaken support for Ukraine

clock 10 May 2024 • 2 min read
'TunnelVision' bug potentially allows snooping on all VPNs

'TunnelVision' bug potentially allows snooping on all VPNs

Operating system features can be manipulated to divert traffic away from encrypted VPN tunnel

clock 08 May 2024 • 3 min read
Bots now account for half of all web activity

Bots now account for half of all web activity

Nearly half of internet traffic is now automated, with malicious bots on the rise

clock 07 May 2024 • 3 min read