Web Hosting Articles

  Home arrow Web Hosting Articles arrow Methodologies of the RBN
Web Hosting Articles  
Web Hosting FAQs  
Web Hosting How-Tos  
Web Hosting News  
Web Hosting Reviews  
Web Hosting Security  
Weekly Newsletter 
 
Developer Updates  
Free Website Content 
 RSS  Articles
 RSS  Forums
 RSS  All Feeds
Write For Us 
Contact Us 
Site Map 
Privacy Policy 
Support 
 USERNAME
 
 PASSWORD
 
 
  >>> SIGN UP!  
  Lost Password? 
WEB HOSTING ARTICLES

Methodologies of the RBN
By: James Payne
  • Search For More Articles!
  • Disclaimer
  • Author Terms
  • Rating: 5 stars5 stars5 stars5 stars5 stars / 2
    2008-03-12

    Table of Contents:
  • Methodologies of the RBN
  • Fake Spyware/Anti-Malware Continued
  • IframeCash
  • Search Exploit

  • Rate this Article: Poor Best 
      ADD THIS ARTICLE TO:
      Del.ici.ous Digg
      Blink Simpy
      Google Spurl
      Y! MyWeb Furl
    Email Me Similar Content When Posted
    Add Developer Shed Article Feed To Your Site
    Email Article To Friend
    Print Version Of Article
    PDF Version Of Article
     
     

    SEARCH WEB HOSTERS

    TOOLS YOU CAN USE

    advertisement

    Methodologies of the RBN


    (Page 1 of 4 )

    In our last article we discussed, briefly, the background of the RBN and gave an overview of their activities. In this second part of a series on Cybercrime, Cybercriminals, and Internet Syndicates, we will cover the various crimes and methods employed by the Russian Business Network and some of its affiliates in more detail.

    Fake Anti-Spyware/Malware Programs

    I remember a time, back long before I had ever heard of the RBN or started writing for Developer Shed, I came across an anti-spyware program on the net and installed it. Instantly, I began to get pop-ups on my computer, even when I wasn't surfing the Internet. And it occurred to me for perhaps the first time just how tricky those cybercriminals really were. They had adhered to one of the most basic tactics of evil-doers everywhere: hide in plain site.

    Interestingly enough, I recently reformatted a computer and installed Windows on it. I loaded every update, then promptly downloaded Spybot and installed it, updated it, and ran it. This was prior to going to any other site (well other than Google to search for the Spybot site). By the time Spybot had finished running, I was given a perplexing message: I had 5 pieces of spyware on my system.

    I say this to illustrate one point: no matter where you go, you are not safe. In my section on iFrames, I will better explain why this is and how hackers exploit this method to install malware on your system using sites millions of people trust and rely on every day.

    But I get ahead of myself.

    More Web Hosting Articles Articles
    More By James Payne

    WEB HOSTING ARTICLES ARTICLES

    - Top Wordpress Plugins for SEO
    - Top Drupal Evaluation and Rating Modules
    - Free Network Monitoring Programs for Max Per...
    - E-store Hosting: Free Options for Beginners
    - Dropbox: The Ultimate File-Sharing and Synci...
    - Reviewing the Best Free Web Hosting Sites
    - Businesses Turn to Reseller Web Hosting for ...
    - Multiple Data Center Hosting
    - Web Hosting Goes Green
    - Web Hosting Technology Overview
    - Collaborate: An Examination of Tools for Gro...
    - Social Networking Security
    - Domain Names 101
    - Top Software to Help Manage Your Websites
    - The Evolution of Phishing

    Developer Shed Affiliates

     




    © 2003-2017 by Developer Shed. All rights reserved. DS Cluster - Follow our Sitemap