Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Botnet Scams

Big Bad Hackers taken down

…nada, Germany, Latvia, Denmark, Finland, Romania, Nigeria, Sweden and the UK. This is the biggest bust of a black hat forum to date. Here is the cyber smut list from the www.justice.gov article: J. Gudmunds, 27. He created a botnet that stole data on 200 million occasions. M. Culbertson, 20. He’s the brains behind Dendroid, malware for sale on Darkode that was supposed to steal and control data from Google Android. Clever name, too: “Dend”…

Meet the FBI’s most wanted Hackers

…t from the hackernews.com: Evgeniy Mikhailovich Bogachev (reward: $3 million) Ironically, one of his aliases is one of the most common (and thus easily cracked) passwords: lucky12345. He’s the brains behind the GameOver Zeus botnet and CryptoLocker Ransomware. Over a million computers were infected with this malware, causing nearly $100 million in losses. Nicolae Popescu (reward: $1 million) From Romania, Popescu tricked Americans with…

Zeus Malware Gang take-down

…so used malware called SpyEye, and that, along with Zeus, stole money from major banks. This was a clever operation that included ever-changing Trojans, and mule networks. Another malware that was asphyxiated was the BeeBone botnet, which had taken over 12,000 computers across the world. We can thank the Joint Investigation Team for these successes. And they don’t stop there. The JIT put a stop to the Ramnit botnet, responsible for infecting 3.2…

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT. A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your system, just as if they had physical access to your device. With this access, the person can access your files, use your camera, and even turn on/off your device. RATs…

Botnets Here, Botnets There, Botnets EVERYWHERE

What are these “botnets” you keep hearing about? Botnets (think roBOT + NETwork—gets you “BOTNET”) are a network of secretly compromised, run-of-the-mill home and office computers that have malicious software—controlled by a solitary hacker or cybercrime ring. Hackers use botnets to execute a variety of cybercrimes like page rank sabotage, mass spamming, bitcoin mining, and more. The FBI says there are 18 botnet infections every second…

The Role of Antivirus Software

…hment in an e-mail, not knowing it’s poised to infect his computer. This malware is smart because it evades anti-spam software by presenting as graphics instead of text in the e-mails. Every month means about six million new botnet infections. Between the first and second halves of 2013, new phishing websites doubled in number. Sixty percent of the leading Google search terms returned malicious sites just in the first 100 search results alone….

What is a Denial-of-Service Attack?

…e attacks on a site by two or more persons or machines. These attacks are usually done by cybercriminals using botnets (remote computers that are under their control), to bombard the site with requests. Cybercriminals create botnets by infecting a collection of computers—sometimes hundreds or thousands—with malware that gives them control of the machines, allowing them to stage their attack. There is also an unintentional DoS where a website…

It’s Even Easier Now For Regular Folks To Conduct Cybercrime

…et has been developed, cybercriminals are faced with the challenge of delivering their exploits to their intended victims. An example of this service is the rental of a network of computers controlled by a hacker (known as a botnet) to carry out a denial-of-service (DoS) attack. What is DoS? That’s where the criminal floods a target website with large amounts of traffic so users can’t access the site). Hacking-as-a-Service—Getting a hold of the…

What is a Mobile Botnet?

…ll other malware and access all the data on that computer. For example, the so-called Zeus botnet malware can collect your banking and login credentials and use them to impersonate you or take money from your account. Mobile botnets give criminals some advantages over PC-based botnets. First, the devices attach to many different networks, including business networks, making them a good carrier for infecting other devices. Second, the devices can…

What is a Botnet?

…ware) that allows a hacker to control the infected computers or mobile devices without the knowledge of the device owners. When malware is launched on your computer or mobile device, it “recruits” your infected device into a botnet, and the hacker is now able to remotely control your device and access all the data on your device. A botnet can consist of as few as ten computers, or tens or hundreds of thousands. Millions of personal computers are…

Risky Mobile Applications Plague Users

…tion from other apps) The #1 malicious activity the malicious apps did was send handset and personal information to the hacker Spyware represents about 1/3 of all malware families in our zoo and 23% of mobile spyware joins a botnet or opens a backdoor, increasing the risk of data loss or device abuse What does this mean for you? It means you better be careful with your mobile device and especially what apps you download and use. I don’t know…

17 Percent of PCs Are Exposed

…are installed, listen up: there are millions of viruses out there that will ravage your PC to death. Some can make your PC completely inoperable, while others allow criminals to control your PC remotely, making it part of a “botnet,” used for nefarious ends by a criminal network. But worst of all are viruses that allow criminals to access your data in order to steal your identity. So please, protect your PC with comprehensive security software…

Business Security Measures to Prevent Fake Twitter Accounts

…ts opened in their names or names likened to them. Twitter Worms: Worms infiltrating Twitter spread easily because rather than activating by clicking, users only needed to hover over a link to trigger an action. Twitter as a Botnet Controller: Twitter account Hackers are now using Twitter account to send coded update messages to computers they’ve previously infected with rogue code Twitter Phishing: If you receive a direct message or a direct…

75 Million Unique Malware Samples By 2012

…ary depending on geography and language. Bait can include holidays or sporting events, and often differs by month or season. Attackers have shown remarkable insight into what works for specific people at specific times. Spam botnets: New spam botnet infections continued steadily from February through August of 2011, but dropped somewhat in September. Bad URLs: Website URLs, domains, subdomains, and particular IP addresses can be “bad” or…

Think You’re Protected? Think Again!

…rus for Mac OS X and another 83 mobile viruses. 57 million U.S. adults fell for phishing scams via 17,877 different spoof websites. 80% of all email was spam. The Conficker worm, Zeus Trojan, Koobface, Applescript.THT, Storm botnet, and Ikee iPhone virus all made their debuts this year. By 2010, 54 million unique pieces of malware were spreading to tablets, too. More than 90% of all email was spam. 27% of teens infected their families’ PCs with…

Big Game Scores Big For Scammers

…n a website is created and uploaded to a server, search engines index the scam sites as they would any legitimate site. Doing a Google search can sometimes lead you to a website designed to steal your identity. Zombie PCs: A botnet is a group of Internet-connected zombie personal computers that have been infected by a malicious application, which allows a hacker to control the infected computers without alerting the computer owners. Scott…

Twitter Crime on the Rise

…e all infected. DOS Attack: A denial-of-service attack left Twitter dark for more than three hours. The attack seems to have been coordinated by Russian hackers targeting a blogger in the Eastern European country of Georgia. Botnet Controller: One Twitter account produced links pointed to commands to download code that would make users’ computers part of a botnet. Phishing: Hacked Twitter accounts are used to send phishing messages, which…

Botnets Lead to Identity Theft

…mpliance, customer confidence, reputation, and even of the business itself. For government organizations, the concerns are even more far reaching.” In the second quarter of 2010, more than two million PCs were recruited into botnets in the United States alone. That’s more than five out of every 1,000 personal computers. The rise and proliferation of botnets will continue to put identities at risk. Computers with old, outdated, or unsupported…

Botnets Turn Your PC into A Zombie

…kers use botnets to send spam and phishing emails, and to deliver viruses and other malware. A botnet can consist of as few as ten PCs, or tens or hundreds of thousands. Millions of personal computers are potentially part of botnets. Spain-based botnet Mariposa consisted of nearly 13 million zombie PCs in more than 190 countries. Further investigation determined that the botnet included PCs from more than half the Fortune 1000. This botnet’s…

Botnet Scams

Top 10 Cities for Cyber Crime

…ington , D.C. 4. San Francisco 5. Raleigh , N.C. 6. Atlanta 7. Minneapolis 8. Denver 9. Austin , Texas 10. Portland , Ore. Cities with high concentrations of “spam zombies” placed the highest. Becoming a Zombie and part of a Botnet happens to PCs that aren’t properly secured, coupled with user behavior that invites attacks. If you are surfing porn all day or gaming on distant websites in foreign countries then you are at a higher risk….

Biggest Botnet Goes Bust

…address. This led to his capture. Nice job guys! This is a great plot for a movie! I want to be the dude who sees Netkairo’s IP address and busts him in a high speed chase after he flips his car. Just sayin’. The problem of Botnets persist. There could be thousands out there with untold millions of Zombie PCs infected. Becoming a Zombie and part of a Botnet happens to PC s that aren’t properly secured, coupled with user behavior that invites…

mCrimes Morph Into mBotnets

…s generally banks of multiple PC’s from the 10’s to 10,000’s to millions. There are no hard numbers on botnets but last figure I saw was somewhere between 3-5 million. Another stat is 25 percent of all US based PC’s are on a botnet. That’s just insane. Botnets PC’s are called Zombies. Zombies all generally share a virus in common that allows for a remote control component. The criminal hacker controls the zombies on the botnet via an IRC control…

Top 8 Worst Twitter Social Media Hacks

…rief than anything else. Twitter DOS Attack: Victimized by a denial-of-service attack that left the site dark for more than three hours. Reports of a Russian politically motivated attack seemed to be the origin. Twitter as a Botnet Controller: A Twitter account produced links that led to commands to download code to run a botnet. Twitter Phishing: Sending tweets to update accounts or visit spoofed sites where the user needs to enter credentials…

email Addresses Hacked via a Botnet or Phished?

…cted to the internet that all share a common technology, a virus/spyware that allows a criminal hacker to remotely access and control the machine. A botnet can be 10 PCs, 10,000 PC or many more. The infamous “conficker” is a botnet. Once a PC is infected the criminal hackers can use the botnet to commit crimes, store data and of course siphon data from the machines. However while many of the passwords were weak, there were many passwords that…

Up to 1 Million email Accounts Phished for Identity Theft

…control component , which gives the phisher full access to the user’s data, including usernames and passwords, credit cards details, banking and Social Security numbers. Often, that same virus makes the victim’s PC part of a botnet. How to avoid becoming a victim? Delete. Change passwords often. Combine uppercase and lowercase letters, as well as numbers and characters. Don’t use consecutive letters or numbers, and never use names of pets,…

Criminal Hackers Get to Momma and DaDa Via Children

Robert Siciliano Identity Theft Expert I’m particularly irate about this. There’s criminal hackers, then there’s complete lowlife scumbag criminal hackers that hack children. InternetNews reports hackers took over sections of the PBS.org Web site earlier this week, installing malicious JavaScript code on the site’s “Curious George” page that infects visitors with a slew of software exploits. For the uninitiated Curious…

Social Security Numbers Cracked, Creates Identity Theft Risk

Robert Siciliano Identity Theft Expert SearchSecurity.com reports that researchers at Carnegie Mellon University have developed a reliable method to predict Social Security numbers using information from social networking sites, data brokers, voter registration lists, online white pages and the publicly available Social Security Administration’s Death Master File. Originally, the first three numbers on a Social Security card represented…

Data Breaches; LexisNexis – FAA Hacked, Botnets Grow, Hackers Hold Data Ransom

…nd makes a big contribution to the overall figure of compromised Windows PCs, but other strains of malware collectively make a big contribution to this number. McAfee’s Threat Report notes that the US is home to 18% of botnet-infected computers. While you can’t do much about others being irresponsible with your data, you can protect your identity, to a degree. Consider investing in identity theft protection and always keep your…

Phishers Getting Smarter

…ally get someone to buy in. Not too long ago, most spam emails came from a few legitimate servers. Once the government cracked down with the Can Spam Act, spam went underground. Most of today’s phishing emails originate from botnets. But what hasn’t changed much is the fraud victims’ sophistication, or lack thereof. The scammers are smarter, but the victims, not so much. While phishing emails keep pouring in, their methods are changing…

Identity Theft Expert; Organized Webmobs Focused on Cyber Crime

…r data compromised in some way. Unsuspecting computer users who do not update their PC’s basic security, including Windows updates, critical security patches or anti-virus definitions often become infected as part of a botnet. Botnets are used to execute many of the attacks on unprotected networks. The same study shows computer users were hit by 349 billion spam and phishing messages. Many were tricked into giving up personal information….

Conficker flexes muscles, phones home

…Conficker is updating via P2P, as opposed to pinging a website for its updates. This makes Conficker “self reliant.” A botnet is a robot network of zombie computers under the control of a single leader. The concept behind a botnet is strength in numbers. Botnets can attack websites, send spam, and log data, which can lead to data breaches, credit card fraud and identity theft, and ultimately clog a network until it shuts down. CNET reports that…

botnet-herder

Identity Theft Speaker; Confickers Threat Hasn’t Waned www.IDTheftSecurity.com

…an very well lead to major data breaches and identity theft. As the virus continues to call home for the yet to be delivered update, researchers have determined an estimated 3.5 to 4 million PCs are infected on the Conficker botnet, which is the most powerful and dangerous aspect of Conficker. Overall totals of infected computers may still be between 10 and 15 million. Many of those have a dormant virus that has the capability to wreak havoc, or…

WWW. Weird Wild Web Goes Nutty

Robert Siciliano Identity Theft Expert Every day new reports of another flaw and another breach. Today we learn attacks rise 33 percent. I’m not surprised. Credit card details of 19,000 Brits have been found on a cached Google page, where they had been accidentally published by fraudsters. Silly criminal hackers need to tighten up their data security controls and not publish sensitive data like that! Reuters reports – Fraud on the…

Identity Theft Speaker; April Fools Day is conficker worm day

…eated and released the Conficker virus. Even with the security community vigorously trying to defend PCs globally, in early March, millions of Conficker-infected PCs were upgraded into a peer to peer network, which makes the botnet even more dangerous by giving each infected PC commanding authority over others. This means that every PC has the capability of running every other PC on the botnet. The anticipation among researchers leading up to…

botnet

Data scams have kicked into high gear, Mr. Ming Yang Has 31,000 Viruses

…reak havoc. They’d delete your files or crash your machine. Not any more. They want your machine running smooth and efficient. Your computer network is an asset to organized criminals. They utilize your computing power as a “botnet”, which is a robot network of computers connected to the internet sitting in your home or office. All computers connected to a botnet share something in common, usually a virus that allows for a remote control…

Identity Theft Expert; Are Legitimate Sites the Next Malware Threat?

…opening attachments, updating anti-virus, securing wireless connections, avoiding P2P downloads and not spending any time in the bowels of the web. Where many fail is routinely updating whats is outdated or flawed. Further, attention is often paid to functionality and to build-out of an application during development than to security. Consequences often include data breach and becoming part of a botnet. Here is a Fox News video depicting a…

Identity Theft Expert and Speaker on Personal Security: Young, Organized Criminal Hackers Can Hijack Unprotected Computers on a Grand Scale

…tection on CNBC, on NBC’s “Today Show,” FOX News, and elsewhere. On Nov. 30, the Guardian Unlimited reported that law enforcement officials in New Zealand had apprehended an 18-year-old, alleged leader of a botnet hacking ring who went by the online identity of “Akill.” His ring, according to the article, was responsible for the remote control of about 1.3 million computers and the pilfering of $20 million….

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in