("Bot" is shorthand for "software robot," a term generally applied to automated software.) Once the program has made its way onto a victim's computer, it spreads across networks and searches for passwords that are stored on hard drives and are passing across local networks. It also disables antivirus programs and systems for upgrading software security. ">

Articles News Reviews Releases Downloads Contact Us White Papers

A new 'polybot' nightmare for computer security


A new malicious computer program has been detected that can create networks of remotely controlled computers to take part in online attacks, send junk e-mail messages known as spam and engage in other shady activities common to the bad neighborhoods of cyberspace. The new program, known as "phatbot" or "polybot," uses technology like that developed for file-sharing networks like Gnutella and KaZaa to control the machines. ("Bot" is shorthand for "software robot," a term generally applied to automated software.) Once the program has made its way onto a victim's computer, it spreads across networks and searches for passwords that are stored on hard drives and are passing across local networks. It also disables antivirus programs and systems for upgrading software security.

Phatbot, which is technically known as a computer worm, was considered to be novel enough that the Department of Homeland Security asked a group of computer analysts last week to examine and monitor it, said Donald Tighe, a spokesman for the department. The department was expected to announce reports on Thursday by Internet security task forces as part of the Bush administration's National Strategy to Secure Cyberspace, which was developed to bring government, business and academic resources together to address computer security issues.

Read Full Story


News
20 ways to Secure your Apache Configuration
Jun 16, 2006, 15:03 EST
Layered Encryption, an Absolute Necessity
Jun 16, 2006, 15:01 EST
Phishing scam uses PayPal secure servers
Jun 16, 2006, 13:32 EST
IPLocks Closes $11 Million in Strategic Funding
Jun 16, 2006, 08:34 EST
Doombot Worm Spreads Via Phishing Model Attack
Jun 16, 2006, 07:14 EST
Fusion Softphone Turns Computer into VoIP Telephone
Jun 16, 2006, 06:17 EST
Genuine Advantage is Microsoft spyware
Jun 16, 2006, 06:09 EST




Site Meter