August 17, 2009
A leading security company claims that Twitter is being exploited by those who own and control botnets — clusters of computers taken over without owner knowledge and often used to launch denial of service attacks.
Arbor Networks suggests that Twitter accounts are being set up to broadcast links to malicious code. Those computers already part of the botnet would then follow these links, via RSS feed, in order to get new instructions/targets. read more
Tags: botnet, malware, Twitter
February 19, 2009
The news came through a couple of days ago that Microsoft’s Live Hotmail CAPTCHA system has yet again been compromised by spammers.
The method works by using an army of zombie PCs (those that have been compromised by malicious software and can be remotely controlled) and a remote computer server to handle image decoding.
It’s not the first time Microsoft’s system has been compromised, and it likely won’t be the last. Other online accounts aren’t immune either. Spammers need lots of fake accounts in order to send emails and publish splogs. read more
Tags: botnet, CAPTCHA, hotmail, Microsoft, Spam, spammers, splog, zombie