Similar Articles |
|
Wired November 2006 Scott Berinato |
Attack of the Bots The latest threat to the Net: autonomous software programs that combine forces to perpetrate mayhem, fraud, and espionage on a global scale. How one company fought the new Internet mafia - and lost. |
BusinessWeek August 13, 2009 Joel Schectman |
Computer Hacking Made Easy Botnet attacks like the one that took down Twitter are becoming so easy and cheap, almost anyone can do it. |
PC World May 23, 2001 Frank Thorsberg |
Sizing Up Cybervandalism: Thousands Hit Monthly Researchers find debilitating hacker attacks cross borders to hit big and small targets... |
InternetNews May 18, 2007 Sean Michael Kerner |
Estonia Under Russian Cyber Attack? Data by a security research firm clearly shows that a full-scale assault is under way, but the attackers' identity and location is still uncertain. |
InternetNews January 15, 2009 Richard Adhikari |
The Web's Latest Threat: Smarter 'Zombies' Hacker-controlled PCs are outwitting security software - and are growing in number. |
PC Magazine August 20, 2008 Matthew D. Sarrel |
There's a Bot in Your PC Aiding the rise of blended threats around the world, botnets are digging in and using your network as a base of operations. |
InternetNews June 15, 2007 Andy Patrizio |
Four Bot Herders Get Put Out To Pasture Your spam filters have ever so slightly less work to do today, thanks to several arrests of bot herders by the FBI. |
PC Magazine August 7, 2009 Lance Ulanoff |
Twitter's Down and It's All Your Fault The micro-blogging service's difficulties are troubling. Why it's suffering through a DDoS attack is even more upsetting. |
PC World October 24, 2007 Erik Larkin |
The Internet's Public Enemy Number One The Storm Worm has infected so many machines that it's now one of the most powerful supercomputers. |
InternetNews March 17, 2006 Sean Michael Kerner |
Botnets on The Run? Security researchers have identified numerous botnets of zombies in recent days and in at least one case ended their reign of the undead. |
PC Magazine June 20, 2007 Larry Seltzer |
Beware Windows Hactivation Threat A new Trojan horse masquerading as a Windows security check is wreaking havoc on PCs. Find out how you can keep your system safe. |
Bank Technology News May 2006 Holly Sraeel |
If Financial Crime is Rising, Then Security is Job #1 Furthered along by a loosely knit network of criminals, cybercrime is being waged by hackers and botmasters for profit in ways that are often not easily tracked by financial institutions, law enforcement authorities and governments. |
Bank Technology News April 2007 Rebecca Sausner |
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. |
Search Engine Watch January 20, 2010 Jason King |
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. |
InternetNews October 25, 2006 Roy Mark |
Floridian Charged in Akamai Attack A 32-year-old Floridian faces charges in Massachusetts for his alleged role in launching a distributed denial of service attack on Akamai Technologies. |
InternetNews June 3, 2005 Tim Gray |
Ever-Morphing Bagle Virus Going Strong A new variant of the Bagle downloader virus is spreading havoc again on unsuspecting users' machines, according to e-mail security firm MessageLabs. |
InternetNews October 26, 2006 Ed Sutherland |
Zombies Control Half of Windows PCs Software giant Microsoft has crowned the "zombie" PC the greatest threat to Windows users. |
Information Today February 4, 2013 Paula J. Hane |
A Cyber War Is Brewing A cyberwar has been brewing and although you might view this battle as governments going head to head in a shadow fight, experts say the battleground is shifting from government entities to the private sector, to civilian targets that provide many essential services to U.S. citizens. |
Popular Mechanics June 2007 Joel Johnson |
Hack Attack: Is the Whole Internet at Risk? Some hackers recently tried to take down the entire World Wide Web. You didn't even notice because the Internet is so robust. |
InternetNews August 29, 2006 Roy Mark |
Botnet Perp Hit With Three-Year Prison Term Adware scam results in damaged computers at Seattle hospital and U.S. military installations. |
PC Magazine December 14, 2004 Jay Munro |
Bots March In These worms could "zombify" your computer, but you can give bots the boot. |
InternetNews August 6, 2009 |
Twitter, Facebook Hit in Denial-of-Service Attacks Social media phenoms Twitter and Facebook this morning suffered bouts of downtime - with each blaming a denial-of-service (DDoS) attack for its woes. |
InternetNews October 3, 2007 Andy Patrizio |
Symantec Adds Bot Hunting to Managed Services By using a traceback method, Symantec can look for hidden botnets within a corporate network. |
The Motley Fool July 13, 2009 Rich Smith |
Welcome! You've Got Hackers! Someone threw a cyber war this week. It's great to know that the government is spending billions hardening the IT system against more competent attackers, but what we really need here is a solution to the real problem: Identifying who the attackers are. |
InternetNews April 27, 2009 Alex Goldman |
Conficker Awakens With Scareware and Spam The new activity on the Conficker botnet shows that the criminal economy is functioning well. |
Wired August 21, 2007 Joshua Davis |
Hackers Take Down the Most Wired Country in Europe How Estonia dealt with a botnet strike that targeted almost every digital front all at once. |
InternetNews August 14, 2009 |
Twitter Used as Botnet Control As bot herders learn to exploit legitimate sites, researchers warn that IT managers will need to monitor social media closely. |
PC World October 23, 2002 Paul Roberts |
Net Attack Could Be First of Many, Experts Warn Future attacks could succeed in bringing down the Internet and are surprisingly simple to launch, security insiders say. |
The Motley Fool December 5, 2010 Dean Takahashi. |
WikiLeaks Reveals How Google Was Targeted in China Documents lay bare vast hacking attempts by Chinese leaders. |
InternetNews March 25, 2010 |
Symantec: China Is Tops in Targeted Malware Symantec's latest report pinpoints China as the leading source of malware tailored to hoodwink execs in specific industries. |
PC World August 2006 Andrew Brandt |
The 10 Biggest Security Risks You Don't Know About Hackers, scammers, and identity thieves are constantly coming up with new ways to attack your PC and your privacy. Here are the newest perils and how to foil them. |
InternetNews January 28, 2005 Sean Michael Kerner |
Weak Passwords Leave Win MySQL Vulnerable Got a weak-password habit? If you're not running the latest anti-virus scanners along with MySQL, you could have a bot problem. |
PC World July 23, 2007 Lincoln Spector |
Proper ID for a Zombie PC If you can't tell by its ravenous appetite, glassy-eyed stare, and leprous casing, how do you know whether your system has become one of the living dead? |
InternetNews June 25, 2004 Ryan Naraine |
Malware Hacker Attack Linked to Spammers Experts warn that a highly sophisticated malicious hacker attack could turn millions of PCs into spam zombies. Infected IIS web servers are spreading the malicious software to Internet Explorer users. |
InternetNews December 29, 2005 Roy Mark |
Oregon Man Cops Plea in eBay DDOS Attack A 21-year-old Oregon man faces up to 10 years in prison after pleading guilty this week for his role in launching a distributed denial of service attack on eBay in 2003. |
InternetNews February 7, 2007 Ed Sutherland |
Internet 'Didn't Crumble' Under DNS Attacks Internet users barely felt a ripple yesterday when hackers launched a concerted attack on several key Domain Name System servers. |
InternetNews January 27, 2011 |
British Cops Snag 5 Pro-Wikileaks Hackers Scotland Yard authorities announce arrest of five members of "Anonymous" hacking ring charged with marshaling DDoS attacks against firms that cut off payments service to Wikileaks. |
CIO October 30, 2012 Lucian Constantin |
Lack of Abuse Detection Allows Cloud Computing Instances to Be Used Like Botnets, Study Says Some cloud providers don't detect attacks launched from their networks, researchers say |
InternetNews September 20, 2005 Roy Mark |
Malicious Code For Profit New trend finds shifts toward attacks seeking confidential information. |
Bank Systems & Technology February 18, 2010 Penny Crosman |
Q&A: Alex Cox, Discoverer of Today's Massive Botnet Attack Data security expert Alex Cox tells how banks can protect themselves against the Kneber botnet he discovered, which has infected 75,000 computers at 2,500 organizations around the world, and which is still active. |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Fast Company John Paul Titlow |
GitHub Is Still Under The Biggest DDoS Attack In Its History In the biggest DDoS attack in its history, GitHub is facing an onslaught of malicious inbound traffic from what appear to be China-based sources. |
InternetNews November 4, 2005 Tim Gray |
Botnet Zombie Maker Faces 50 Years Federal Authorities have arrested and charged a California man with hijacking hundreds of thousands of computers and creating a vast zombie network that launched denial of service attacks and spewed spam. |
Popular Mechanics September 2008 Glenn Derene |
Top 3 Threats and Countermeasures From the Coming Cyberwar: Glossary An explanation of terms like DDoS, root-level penetration, etc. |
National Defense October 2009 Jean & Erwin |
Research Detects Spamming Attacks Researchers at Microsoft have developed a system to detect botnet attacks on Web email providers |
PC Magazine October 1, 2003 Brett Glass |
Don't Let Your PC Become a Porn Zombie Protect your computer from takeover. We tell you how. |
InternetNews February 2, 2009 Richard Adhikari |
Are Legitimate Sites the Next Malware Threat? Businesses may be exposing their customers to malware by leaving their sites unpatched, IBM warns in a new study. |
CFO January 30, 2004 Esther Shein |
Spy vs. Spy Companies are spending billions on network security, but staying ahead of hackers may be a pipe dream. |
InternetNews August 4, 2009 |
Businesses Not Immune to Botnets, Report Warns A new report delivers best practices on dealing with this spam vector. |
Wall Street & Technology January 5, 2007 Larry Tabb |
Preparing for the Inevitable While electronic thefts can be cleaner, less physical and certainly less bloody, the chance of getting money out of a brokerage or bank illegally is usually greater with a gun than a computer. But as the criminals and terrorists get smarter, we too must raise the bar. |