Tag Archive | "peer-to-peer"


03 March 2008 | 6,483 views

New Sophisticated Botnets Discovered

It seems like botnets are getting more sophisticated – we thought the Storm Worm was pretty hot, but some of these new contenders are showing the guys on the dark side has some advanced understanding of technology and the architecture many companies use…this enables them to get deeper inside and remain undetected Researchers have unearthed [...]

Continue Reading


28 February 2008 | 10,695 views

Teenage Bot Herder Admits to Infecting Military Computers

Hacking for money again? Well not really in this case, more like script kiddying for money – modifying an ‘off the shelf’ malware/bot package to evade detection and then cashing in on spamware affiliate fees. I guess they could have made much with a 400,000 bot network – by renting it out for DDoS attacks [...]

Continue Reading


19 November 2007 | 14,879 views

The World’s Biggest Botnets – Peer to Peer

So what’s coming next, after Storm you might ask. You might remember Storm Worm Descending on Blogspot recently and other news about Botnets spiraling out of control accounting for almost 25% of online computers. Well apparently next will be p2p or peer to peer Botnets which could literally blow Storm away. You know about the [...]

Continue Reading


03 June 2006 | 5,814 views

The MPAA TorrentSpy Hacker – $15,000!

Ah the big boys can’t get in legitimately, so they are starting to use underhand tactics eh? A lawsuit filed Wednesday accuses the Motion Picture Association of America of hiring a hacker to steal information from a company that the MPAA has accused of helping copyright violators. The lawsuit (click for PDF), filed in U.S. [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·