Web Hosting Articles

  Home arrow Web Hosting Articles arrow Page 4 - Malware Attacks Growing at Popular Web...
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Malware Attacks Growing at Popular Websites
By: Joe Eitel
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 3
    2008-08-06

    Table of Contents:
  • Malware Attacks Growing at Popular Websites
  • SQL Injections
  • Malware is No Longer about Technology, but Big Business
  • Other Legitimate Websites Hackers Use

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Malware Attacks Growing at Popular Websites - Other Legitimate Websites Hackers Use


    (Page 4 of 4 )

    There are other legitimate websites that hackers use to promote their businesses. YouTube is not the only place these hackers advertise their trade, but they use other social networking websites and blogs as communication tools to stay in touch with their customers as well as business partners. For example, they keep blogs on livejournal.com. These hackers don't necessarily reveal their malware actions. Instead, they tend to communicate in code. For example, they may spew out fascist beliefs that only other groups will understand. Another communication method that hackers may use to advertise their trade is using an ICQ handle.

    Tom Bowers, a senior security evangelist with Kapersky Lab, an anti-virus manufacturer, said that he is working with law enforcement officials to track down hackers through these social networking websites. However, these hackers are also watching the cops. At MySpace, for example, with a few lines of JavaScript code, anybody who comes to the page is automatically registered to the hacker's video channel. In other words, the profile page automatically records every single MySpace user that's visited it.

    Law enforcement officials can get useful information, but because selling malware is not illegal, it will be challenging to bust these hackers. If law enforcement officials can prove the user intended to use the malware for criminal purposes, it can prosecute the person, and possibly the seller. But again, this can be difficult. Law enforcement will have to spend long hours on tracking these criminals. Unfortunately, catching these criminals is not at the top of list for the Department of Justice.

    Fighting hackers has become a never-ending battle, and will always be. One way to combat the hackers is to not only implement more security measures, but IT security professionals must learn the mindset of hackers. In other words, they must think like hackers. For start, the IT security professionals can become familiar with the tools these hackers use. They'll also need to keep in mind that hackers will also think like them. But if IT security professionals are determined to win this battle, they must try to stay a couple of steps ahead of these criminals.


    DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware.

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap