1. By continuing to use the site, you agree to the use of cookies .This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy.Find out more.
    Dismiss Notice
  2. Follow Casinomeister on Twitter | Facebook | YouTube | Casinomeister.us US Residents Click here! |  Svenska Svenska | 
Dismiss Notice

Poll:Best Screenshot of the Month?



Candidates Revealed...Cast your vote!.
Dismiss Notice
REGISTER NOW!! Why? Because you can't do diddly squat without having been registered!

At the moment you have limited access to view most discussions: you can't make contact with thousands of fellow players, affiliates, casino reps, and all sorts of other riff-raff.

Registration is fast, simple and absolutely free so please, join Casinomeister here!

Stolen-data trove offers look inside a botnet

Discussion in 'The Attic' started by Mousey, Mar 15, 2009.

    Mar 15, 2009
  1. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    You must register/login in order to see the link. (AP)
    Posted on Sun Mar 15, 2009 12:43PM EDT

    SAN FRANCISCO - Getting hacked is like having your computer turn traitor on you, spying on everything you do and shipping your secrets to identity thieves.

    Victims don't see where their stolen data end up. But sometimes security researchers do, stumbling across stolen-data troves that offer a glimpse of what identity theft looks like from criminals' perspective.

    Researchers from U.K.-based security firm Prevx found one such trove, a Web site used as a stash house for data from 160,000 infected computers before it was shut down this month.

    The find offers a case study on just how much data criminals are stealing every day, from the utterly inconsequential to the alarmingly private.

    It also shows the difficulty in shuttering criminals' ...

    ***********

    also in the article...

    *********

    I wanted to add that this illustrates very clearly the reason trojans/malware are more than just an irritation or aggravation which necessitate going thru the hassle of cleaning and sometimes reformatting our computers. They are a very real threat.
     
    Last edited: Mar 16, 2009
    4 people like this.
  2. Mar 17, 2009
  3. Mousey

    Mousey Ueber Meister Mouse CAG

    Occupation:
    Pencil Pusher
    Location:
    Up$hitCreek
    Kraken the botnet: The ethics of counter-hacking

    You must register/login in order to see the link.

    Security Strategies Alert By M. E. Kabay , Network World , 03/17/2009

    The Kraken (a 19th century word referring to a giant squid) is a huge network of personal computers that have been infected with software that turns them into zombie systems under the control of a master program - a botnet. The Kraken botnet is used by criminals to generate spam.

    Kelly Jackson Higgins, writing for DarkReading, says, like Storm, Kraken so far is mostly being used for spamming the usual scams high interest loans, gambling, male enhancement products, pharmacy advertisements, and counterfeit watches, for instance. The botnet is the largest known; in April 2008 it was estimated to have included 400,000 zombies.

    Gregg Keizer of Computerworld reports that in April 2008, TippingPoint researchers Pedram Amini and ....
     
    1 person likes this.
  4. Mar 18, 2009
  5. jas2587

    jas2587 Ueber Meister

    Occupation:
    none
    Location:
    FL
    Oh Bloody Hell:D

    Cindy
     

Share This Page