Showing results 1 to 15 of 15

September 16, 2013 by

Who's on Tor? Dissent, bots or porn?

Researchers who found a vulnerability in the protocols used in the Tor anonymous Internet service used it to survey the traffic on the network. They found that "…while the content of Tor hidden services is rather varied, the most popular hidden services are related to botnets."

June 17, 2009 by

'Golden Cash' network - rent a botnet

Finjan said that they have uncovered an underground botnet-leasing network where cyber criminals can pay $5 to $100 to install malware on 1,000 PCs for things like stealing data and sending spam.

July 24, 2008 by

Click fraud in 2nd quarter of 2008 more sophisticated, botnets to blame

Whereas the overall click fraud rate isn't increasing, it's not decreasing either, remaining flat for the first two quarters of 2008, according to data gathered from the Click Fraud Network, consisting of more than 4,000 online advertisers and agencies. Click Forensics report for the second quarter of 2008, indicates that botnets continue being used for click fraud, the preferred and more efficient approach compared to hiring human clickers on a revenue sharing basis.

May 28, 2008 by

Botnets committing click fraud observed

What's the current state of click fraud, and what tools and tactics do the people behind click fraud campaigns have in their arsenal? A recently analyzed affiliate based network for using botnets to commit click fraud provides a timely assessment of the situation, and provides evidential facts on the internal success rate of such a consolidated botnet.

December 13, 2007 by

Hackers to target iPhone in 2008

Its immense popularity may turn the iPhone into a painful experience for Apple, if predictions that the mobile device will be a major security target in 2008 are realised.

November 9, 2007 by

Stop the botnets!

This is the intention of Paul Barford, a computer scientist at the University of Wisconsin-Madison. He wants to build a new line of defense against malicious traffic which has become today a billion-dollar 'shadow industry.' As one of 'the most menacing aspects of botnets is that they can go largely undetected' by a PC owner, he developed a new computer security technique for detecting network intrusions. His system has a 99.9% detection rate of malicious signatures, roughly equivalent to some of the best commercial systems. But it has zero false positives when commercial systems have high numbers. This new system could soon be available commercially.

May 29, 2007 by

Symantec warns of "parasitic storage"

Security specialist Symantec has warned businesses over an increasing trend for criminals to use "parasitic storage" on networks of compromised systems.While botnets -- illegal networks of PCs infected with remote software by hackers -- are used mainly for sending spam, criminals are increasingly storing sensitive or illegal data in distributed environments, the security company told our sister site ZDNet UK on Tuesday.


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular