The Evolution of Spam, Part 2: New Defenses

Spam network operators, otherwise known as “botnet herders,” are becoming increasingly proficient at evading detection and harnessing the power of peer-to-peer (P2P) computing, much to the consternation of spam detection, prevention and IT security specialists, as Part 1 of this series discusses.

“There is no single head to cut off, no centralized command structure to attack. These aren’t the Red Coats standing in a neat formation; these are guerrillas scattered across the landscape with known objectives and infrequent need for direction,” said Randy Abrams, ESET’s director of technical education.Spam network operators, otherwise known as “botnet herders,” are becoming increasingly proficient at evading detection and harnessing the power of peer-to-peer (P2P) computing, much to the consternation of spam detection, prevention and IT security specialists, as Part 1 of this series discusses.Botnet operators are using spam and recipients’ “zombie” PCs to create what amounts to a “shadow” Internet Over 800,000 High Quality Domains Available For Your Business. Click Here. and growing rich in the process. What’s more troubling is that the problem is not likely to go away soon. Legitimate companies and businesses are making use of the same spam artists and botnet operators who manage the P2P networks that are also distributing malware. Meanwhile, lax enforcement regimes make the problem much more difficult to combat.
http://ecommercetimes.com/story/The-Evolution-of-Spam-Part-2-New-Defenses-60344.html

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.