秃公
加入时间: 2006/09/12 文章: 1667
经验值: 1777
|
|
|
作者:秃公 在 罕见奇谈 发贴, 来自 http://www.hjclub.org
Most computer attacks originate in U.S.
By JORDAN ROBERTSON, AP Technology Writer Mon Mar 19, 6:18 AM ET
SAN JOSE, Calif. - The United States generates more malicious computer activity than any other country, and sophisticated hackers worldwide are banding together in highly efficient crime rings, according to a new report.
Researchers at Cupertino-based Symantec Corp. also found that fierce competition in the criminal underworld is driving down prices for stolen financial information.
Criminals may purchase verified credit card numbers for as little as $1, and they can buy a complete identity — a date of birth and U.S. bank account, credit card and government-issued identification numbers — for $14, according to Symantec's twice-yearly Internet Security Threat Report released Monday.
Researchers at the security software company found that about a third of all computer attacks worldwide in the second half of 2006 originated from machines in the United States. That makes the United States the most fertile breeding ground for threats such as spam, phishing and malicious code — easily surpassing runners-up China, which generates 10 percent of attacks, and Germany, which generates 7 percent.
The United States also leads in "bot network activity." Bots are compromised computers controlled remotely and operating in concert to pump out spam or perform other nefarious acts.
.....http://news.yahoo.com/s/ap/20070319/ap_on_hi_te/internet_security_threats
Bots and malware
A bot is a compromised computer which is running software that allows a remote computer to control it. The software is usually installed by someone breaking into the computer, but can also be installed by a user who thinks they're installing a game or other software which they have downloaded from a website or recieved via Instant Messenger (IM).
A botnet is a large collection of compromised computers (bots) which are controlled by a very small number of remote computers. Communication is often done using Internet Relay Chat (IRC, an older instant messaging protocol). Wikipedia has a definition of botnet here.
....
Unless you can determine specifically what you need to do to clean up the system (either because you found a disinfection program that does a good job and detects the bot software or because you've managed to find all the services, files and registry keys that have been changed or installed), your only course of action to secure your system is to rebuild it from scratch.http://8help.osu.edu/2484.html
作者:秃公 在 罕见奇谈 发贴, 来自 http://www.hjclub.org |
|
|