Malware Attacks Growing at Popular Websites - Other Legitimate Websites Hackers Use
(Page 4 of 4 )
There are other legitimate websites that hackers use to promote their businesses. YouTube is not the only place these hackers advertise their trade, but they use other social networking websites and blogs as communication tools to stay in touch with their customers as well as business partners. For example, they keep blogs on livejournal.com. These hackers don't necessarily reveal their malware actions. Instead, they tend to communicate in code. For example, they may spew out fascist beliefs that only other groups will understand. Another communication method that hackers may use to advertise their trade is using an ICQ handle.
Law enforcement officials can get useful information, but because selling malware is not illegal, it will be challenging to bust these hackers. If law enforcement officials can prove the user intended to use the malware for criminal purposes, it can prosecute the person, and possibly the seller. But again, this can be difficult. Law enforcement will have to spend long hours on tracking these criminals. Unfortunately, catching these criminals is not at the top of list for the Department of Justice.
Fighting hackers has become a never-ending battle, and will always be. One way to combat the hackers is to not only implement more security measures, but IT security professionals must learn the mindset of hackers. In other words, they must think like hackers. For start, the IT security professionals can become familiar with the tools these hackers use. They'll also need to keep in mind that hackers will also think like them. But if IT security professionals are determined to win this battle, they must try to stay a couple of steps ahead of these criminals.
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |