Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 3 - Malware Attacks Growing at Popular Web...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Malware Attacks Growing at Popular Websites
By: Joe Eitel
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 3
    2008-08-06

    Table of Contents:
  • Malware Attacks Growing at Popular Websites
  • SQL Injections
  • Malware is No Longer about Technology, but Big Business
  • Other Legitimate Websites Hackers Use

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Malware Attacks Growing at Popular Websites - Malware is No Longer about Technology, but Big Business


    (Page 3 of 4 )

    Other websites on which malware has become dominant are social networking, video sites, and of course blogs. An article posted on the Washington Post's website, Web 2.0 Sites a Thriving Marketplace for Malware, shows that malware has become a big business. The story was originally written by Eric Larkin, of PC World. The article starts out by talking about a disturbing video found on YouTube. In the video, there's a young, thin man with its head shaved, pointing a handgun directly at the camera.

    Most YouTube users might believe this video is an advertisement, but it's not. The video was actually created by a group of underground Albanian hackers. In addition to showing a shot of the gunman, the video features images of a computer screen, a table showing foreign currency, as well as numerous links to the group's website. These hackers used legitimate websites to promote their own underground trade.

    A question that was asked in the article was, how can these hackers promote their trade and get away with it? Shouldn't YouTube delete these videos? To go even further, should it try to prosecute these people? The author points out that selling malware is not illegal in either the United States or in other countries. It's using the malware that's illegal. Zulfikar Ramzan, a senior principal researcher with Symantec Security Response, mentioned that malware has moved from technology towards marketing and selling.

    This group of Albanians was bold. Usually professional hackers keep low profiles. According to Ramzan however, the group didn't fear any legal consequences. So there was no reason to keep a low profile.

    Unfortunately, YouTube has become a popular spot for malware attackers in that they use this venue to advertise their own services. YouTube was asked about this trend, and the site's spokesman mentions that the website is not responsible for the content on its website. It will however investigate any videos that users deem unsuitable.

    More Web Hosting Articles Articles
    More By Joe Eitel

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap