![]() ![]() We're getting a rich set of commands and capabilities used by the bad guys."īots are incorporating encryption and shape-shifting polymorphism, as the variant of Agobot (also known as Gaobot) showed last year, and using rootkits - code that allows a permanent and undetectable presence on a computer - to bury deep inside a machine. ![]() "Instead of fighting with each other, these guys are working together and posting their code. "The state of bot technology has reached the point that the state of Web technology has," says Peter Tippett, CTO at Cybertrust, whose security experts dive into the online netherworld to track almost 12,000 people contributing to bots or renting out botnets. In addition, while botnets once were controlled exclusively through Internet Relay Chat (IRC) channels - one reason many companies say they block IRC firewall ports - they increasingly are being manipulated through other means, such as the Web, instant messaging or peer-to-peer. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |