Malware Writers Using Open-Source Tactics
Source: John P. Mello Jr. - Posted by Joe Shakespeare   
Hacks/Cracks Among the devilish deeds that can be perpetrated by Trojans is the creation of "zombie networks" -- networks typically composed of home computers surreptitiously controlled by a badware's author. "We estimate that spam zombie networks are responsible for from anywhere to 25 to 30 percent of the spam on the Internet today, and it's growing," said Scott Chasin, CTO of e-mail defense solutions company MX Logic. . . . Among the devilish deeds that can be perpetrated by Trojans is the creation of "zombie networks" -- networks typically composed of home computers surreptitiously controlled by a badware's author. "We estimate that spam zombie networks are responsible for from anywhere to 25 to 30 percent of the spam on the Internet today, and it's growing," said Scott Chasin, CTO of e-mail defense solutions company MX Logic.

The techniques used to develop open-source software like Linux have proven to be so effective that they've been adopted by malware writers to improve their mischievous ways.

Read this full article at John P. Mello Jr.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!