Botnets: How They Attack—And How They Can Be Defeated
Transforming Banks for a Digital Future: The Winners, The Losers, and the Strategies to Beat the Odds
The Federal Bureau of Investigation said last week that it has identified more than 1 million captive computers.
Tracking "zombie" computers—those taken over remotely and forced to send out spam, spyware or denial-of-service attacks—presents a challenge for law enforcement, according to Shawn Henry, deputy assistant director of the FBI's Cyber Division.
Some IP addresses can be tracked to an individual, Henry says, but others cannot be tied to an active user.
And security analysts have discovered bots working inside corporations. Network security firm Support Intelligence has posted the names of more than a dozen companies with bots operating within their walls.
Henry says the private sector needs to update security software and policies to keep bots out of their networks. But how can companies defend against bots? The first thing CIOs and security executives need to know is how bots operate.
Check out the slide show below for a step-by-step look at how bot herders infect computers.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...