Botnets: How They Attackand#8212And How They Can Be DefeatedBy Brian P. Watson | Posted 2007-06-19 Print
The FBI has ID'd more than 1 million botnets. What can corporations do to protect themselves from an attack?
The Federal Bureau of Investigation said last week that it has identified more than 1 million captive computers.
Tracking "zombie" computers—those taken over remotely and forced to send out spam, spyware or denial-of-service attacks—presents a challenge for law enforcement, according to Shawn Henry, deputy assistant director of the FBI's Cyber Division.
Some IP addresses can be tracked to an individual, Henry says, but others cannot be tied to an active user.
And security analysts have discovered bots working inside corporations. Network security firm Support Intelligence has posted the names of more than a dozen companies with bots operating within their walls.
Henry says the private sector needs to update security software and policies to keep bots out of their networks. But how can companies defend against bots? The first thing CIOs and security executives need to know is how bots operate.
Check out the slide show below for a step-by-step look at how bot herders infect computers.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...