Shares of Twitter Inc (NYSE:TWTR) ended Tuesday session in green amid volatile trading. The shares closed up +0.35 points or 1.50% at $23.72 with 65.49 million shares getting traded. Post opening the session at $23.21, the shares hit an intraday low of $22.90 and an intraday high of $23.98 and the price vacillated in this range throughout the day. The company has a market cap of $20.38 billion and the numbers of outstanding shares have been calculated to be 707.73 million shares.
Twitter Inc (TWTR) operates as a global platform for public self-expression and conversation in real time. The company offers various products and services, including Twitter that allows users to create, distribute, and discover content; and Periscope and Vine, a mobile application that enables user to broadcast and watch video live.
Shares of Symantec Corporation (NASDAQ:SYMC) ended Tuesday session in green amid volatile trading. The shares closed up +0.20 points or 0.80% at $25.16 with 6.92 million shares getting traded. Post opening the session at $24.88, the shares hit an intraday low of $24.81 and an intraday high of $25.17 and the price vacillated in this range throughout the day. The company has a market cap of $15.64 billion and the numbers of outstanding shares have been calculated to be 615.59 million shares.
Symantec Corporation (SYMC) on September 22, 2016 revealed new research demonstrating how cybercriminal networks are taking advantage of lax Internet of Things (IoT) device security to spread malware and create zombie networks, or botnets, unbeknownst to their device owners.
Symantec’s Security Response team has discovered that cybercriminals are hijacking home networks and everyday consumer connected devices to help carry out distributed denial of service (DDoS) attacks on more profitable targets, usually large companies. To succeed, they need cheap bandwidth and get it by stitching together a large web of consumer devices that are easy to infect because they lack sophisticated security.
More than half of all IoT attacks originate from China and the U.S., based on the location of IP addresses to launch malware attacks. High numbers of attacks are also emanating from Germany, the Netherlands, Russia, Ukraine and Vietnam. In some cases, IP addresses may be proxies used by attackers to hide their true location.
Most IoT malware targets non-PC embedded devices such as web servers, routers, modems, network attached storage (NAS) devices, closed-circuit television (CCTV) systems, and industrial control systems. Many are Internet-accessible but, because of their operating system and processing power limitations, they may not include any advanced security features.