What a Botnet Looks Like

Monday, May 12th, 2008

Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings. Read the rest of the story and view the map...

A Case Study on Storm Worm

Friday, April 18th, 2008

A bot is a computer program installed on a compromised machine which offers an attacker a remote control mechanism. Botnets, i.e., networks of such bots under a common control infrastructure, pose a severe threat to today’s Internet: Botnets are commonly used for Distributed Denial-of-Service (DDoS) attacks, sending of spam, or ...

Botnets Running Rampant

Sunday, April 13th, 2008

Cybercriminals have created a global business with a supply chain every bit as organized and sophisticated as that of any legitimate business. The difference is that cybercrime takes advantage of unsuspecting consumers and insecure businesses to steal untold amounts of money. According to security experts and spam fighters speaking at a ...

Security Guru Gives Hackers a Taste of Their Own Medicine

Friday, April 11th, 2008

Malicious hackers beware: Computer security expert Joel Eriksson might already own your box. Eriksson, a researcher at the Swedish security firm Bitsec, uses reverse-engineering tools to find remotely exploitable security holes in hacking software. In particular, he targets the client-side applications intruders use to control Trojan horses from afar, finding vulnerabilities ...

Top botnets control 1M hijacked computers

Wednesday, April 9th, 2008

Storm is a shadow of its former self, Kraken is just another name for Bobax and the biggest botnet goes by the mouthful of "Srizbi," a noted botnet researcher said today as he released the results of his census of the various armies of hacked computers that spew spam. Joe Stewart, ...