Bad malware storms brewing



ADTMAG.com has an interesting article talking of the convergance of spyware and more sophisticated phishing attacks. They talk about the convergance of viruses and spam engines that happened in 2003 as a real shift in the dynamic of WHERE junk mail was coming from. Today botnets account for about 90% of the spam online, and of course, the botnets are the zombie armies that can be (and are being) utilized to bully web pages off the net, or extort large amounts of $$ due to denial of service attacks.


Essentially, the crux of this article though is that the spyware writers are finding that they can get a LOT more information from end users pcs than they’re making use of. They suggest a scenario that could happen where an infected pc whose user has an ebay account and just lost out on an auction could be sent a seemingly legit email explaining that the high bidder backed out and that they are now the winner of the auction, please remit payment to…..

In essense what this means is that we can expect MUCH more targeted and customized phishing attacks, which seems to make sense. Most phishing attacks today are shotgun approaches and may net a number of accounts (sometimes hundreds of accounts.) As that becomes harder to do, I imagine they would start to target smaller groups more specifically (hoping for a higher success rate.) Unfortunately spyware has evolved VERY quickly and is at times installed intentionally for the “neat game” or screensaver or who knows what that the company offers.

Related Posts

Blog Traffic Exchange Related Posts
  • Windows Run commands reference One of the frustrating things about windows is having to wander through X number of menus looking for a specific item that you KNOW is there, but just can't quite find. If ONLY you remembered the command name for it, but the RUN commands are sometimes quite a bit different......
  • Tech support tutorials made easy on linux.... One of the real frustrations with phone tech support is translating step by step what is needed to the person on the other end. I know it sounds easy, but in reality - what if they've got xyz theme for their menuing and it's not there, what if... oh you......
  • The security of remote tech support (ultravnc sc or x11vnc with wrapper script) Well, I've got a nice way of doing "easy" one click (or one cut and paste) light desktop support for windows or linux, one uses ultravnc sc, the other uses x11vnc with a special wrapper script. So, what security flaws are there in this process? Well, for starters, I see......
Blog Traffic Exchange Related Websites
  • Debt Management Plan May Help You Avoid Bankruptcy If you are wondering how on earth you will be able to afford all the things that you want in the future, be it new cars, home improvements or holidays, it is hard to see how that will happen when every penny that you are earning is accounted for. A......
  • How to Replace a Window Replacing your windows can bring numerous benefits to your home. Not only will they look nicer and add value to your property, but you can also gain significant energy savings. Most new windows are now heat and cold efficient and will greatly reduce the amount of drafts coming in as......
  • For High Interest Checking and Savings, Think Small, Look Local If you read other personal finance blogs (and I read dozens), you will be exposed to much information about high yield savings accounts from Internet banks.  Account reviews, updates on interest rates, sign up bonuses, and advertisements - it's everywhere.  This information available is helpful to those who are stuck......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site