HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 13 MINUTES AGO.
You are here: Home / Network Security / Microsoft Strikes Massive Botnet
Neustar, Inc.
Protect your website & network using real-time information & analysis
www.neustar.biz
Microsoft Leads Strike Against Massive ZeroAccess Botnet
Microsoft Leads Strike Against Massive ZeroAccess Botnet
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
DECEMBER
06
2013
(Page 2 of 2)

“I believe the goal for Microsoft is to raise the daily expenses for the botnet owner to the point where the risk and cost can no longer be sustained. Taking key IP addresses away from the bad guys will force them to exert much more effort in order to maintain their precious botnet. This is a great strategy!”

We also asked Ken Pickering, director of engineering at CORE Security, for his thoughts on the Microsoft win. He told us Microsoft is likely doing this because it attacks Windows users to create these botnets.

“So, Microsoft is at least partially responsible for the state of the world’s PC security, since they’re the most often exploited OS for these types of scenarios. Don’t get me wrong. I believe helping the FBI is a good thing,” he said.

“But, realistically, there are so many botnets out there now, that attacking them one by one is only attacking a symptom of the overall problem. It does some good, but we’d also be better off writing less exploitable operating systems and educating users to avoid building these networks in the first place.”

< Previous Page  1  2

Tell Us What You Think
Comment:

Name:

Dawesi:
Posted: 2013-12-16 @ 4:28pm PT
"but we’d also be better off writing less exploitable operating systems and educating users to avoid building these networks"

Good to see quotes from people who understand security. If you can write it, you can hack it. Period. If it's written, people will find a hole, people are paid to do this everyday (good people that is), then the bad people exploit the known holes.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
BMC's shared success is built on 6 fundamental principles: 1) An Intuitive User Experience 2) Agile Application 3) Actionable Intelligence 4) Adaptive Automation 5) Compliance & Risk Mitigation 6) Optimized Infrastructure & Cost. Contact BMC to learn more.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business
© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.