![]() ![]() Others can host phishing or money mule recruiting websites.ĭistributed denial-of-service attacks For similar reasons, zombies are also used to commit click fraud against sites displaying pay-per-click advertising. They rely on the movement of e-mails or spam to grow, whereas worms can spread by other means. This spam also greatly increases the spread of Trojan horses, as Trojans are not self-replicating. This allows spammers to avoid detection and presumably reduces their bandwidth costs, since the owners of zombies pay for their own bandwidth. Zombie computers have been used extensively to send e-mail spam as of 2005, an estimated 50–80% of all spam worldwide was sent by zombie computers. 2 Distributed denial-of-service attacks.Security information and event management (SIEM).Host-based intrusion detection system (HIDS).
0 Comments
Leave a Reply. |