dcsimg
 

Botnets: How They Attack—And How They Can Be Defeated

By Brian P. Watson  |  Posted 06-19-2007 Print Email

WEBINAR:
Live

The New Reality for Customer Engagement


Date: 5/31/2018 @ 1 p.m. ET

The FBI has ID'd more than 1 million botnets. What can corporations do to protect themselves from an attack?

The Federal Bureau of Investigation said last week that it has identified more than 1 million captive computers.

Tracking "zombie" computers—those taken over remotely and forced to send out spam, spyware or denial-of-service attacks—presents a challenge for law enforcement, according to Shawn Henry, deputy assistant director of the FBI's Cyber Division.

Some IP addresses can be tracked to an individual, Henry says, but others cannot be tied to an active user.

And security analysts have discovered bots working inside corporations. Network security firm Support Intelligence has posted the names of more than a dozen companies with bots operating within their walls.

Henry says the private sector needs to update security software and policies to keep bots out of their networks. But how can companies defend against bots? The first thing CIOs and security executives need to know is how bots operate.

Check out the slide show below for a step-by-step look at how bot herders infect computers.

Slideshow: How Bots Attack—and How to Defend

Blog: Bots Found Inside Many Big Companies



 

Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.

By submitting your information, you agree that cioinsight.com may send you cioinsight offers via email, phone and text message, as well as email offers about other products and services that cioinsight believes may be of interest to you. cioinsight will process your information in accordance with the Quinstreet Privacy Policy.

Click for a full list of Newsletterssubmit