11.07.2015 Views

The power of ten - enterpriseinnovation.net

The power of ten - enterpriseinnovation.net

The power of ten - enterpriseinnovation.net

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SECURITYWATCHto keep phishing Web sites active, operators changedomains frequentlytion, a group specializing in sharing informationabout bot<strong>net</strong>s, reported that from 1500 to 3500 in the last two years.Each <strong>of</strong> those 3500 <strong>net</strong>works could containseveral thousands <strong>of</strong> compromisededby multiple bots.In raw numbers, the United Statesbot-infected machines, says Jose Nazario,manager <strong>of</strong> security research at ArborNetworks. “I think it’s very safe fora bot<strong>net</strong>,” he says. “It’s a very dangerousInter<strong>net</strong> for most folks.”Detecting infectionsBot<strong>net</strong>s live or die depending on com- Those communications can tell researchershow large a bot<strong>net</strong> is. Similarly, the a known bot. “Sadly, the lack <strong>of</strong> antivirusalerts isn’t an indicator <strong>of</strong> a cleansimply can’t keep up with the number<strong>of</strong> threats. It’s frustrating [that] we don’t the average home user, more widely deployed.”-s<strong>of</strong>tUpdate and Windows Update, is updat-second Tuesday <strong>of</strong> each month and reports toinfection. You can use another version <strong>of</strong> the -you should run the utility if you notice a sud- Tool garners results. In September 2007,to recognize the Storm bot. Overnightthe size <strong>of</strong> the Storm bot<strong>net</strong> was reduced has since added other prevalent bot<strong>net</strong>sScribe.Proactive options are also available.Pothunter, a free program from SRI In-OS, Windows XP, and Vista. Thoughdesigned for <strong>net</strong>works, it can also run onstand-alone desktops and laptops. log <strong>of</strong> data exchanges that typically oc-an SRI International database <strong>of</strong> adware, before other security vendors picked upon the threat.Future Bot<strong>net</strong>sIf only to demonstrate their resiliency,bots have recently invaded cell phones, While a bot<strong>net</strong> on a mobile phone may<strong>of</strong> renting out a <strong>net</strong>work <strong>of</strong> “owned”phones may be viable in the near future.Regardless <strong>of</strong> the form bots might take,we probably won’t be able to eradicate termanage bot infestations. But in thewe can.www.cw.com.hkSept 2009 Computerworld Hong Kong 43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!