Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

What is BotNet?

What is BotNet?

A botnet is a network of computers that are infected with a virus that hackers can control from a remote location for the purpose of attacks and similar activities.

So, if a virus like this is "inserted" into your computer, you will not know it, but your computer becomes part of hacker attacks from that moment on.

The latest such botnet, called TDL-4, is the most dangerous of all and almost indestructible!

TDL-4 is a type of Trojan that can infect a computer at the level of MBR (Master Boot Record), which makes it more resistant than most malware.

In translation, if this Trojan gets to your computer, you will not even notice it because AntiVirus will not detect it.

More such infected computers are botnets, and TDL-4 today has about four and a half million computers, whose owners have no idea that their computers are under someone else's control.

Namely, unlike ancient, ordinary, viruses that deleted data from your disk, TDL-4 can do much more sophisticated actions on your computer: for example: install other forms of viruses, and botnet owners can then give such computers to some a form of sublease to other criminals, who can use them to install advertisements or to hack a DDoS attack on a server.

Basically, your computer is a "puppet" that BotNet owners use when they need it for an attack.

TDL-4 is so sophisticated that it will even remove other malicious programs that are a threat to it from an infected computer, especially if there is a danger that an antivirus program will detect them.

Computers infected with the TDL-4 Trojan communicate with control centers (computers that give them orders, and which are in the hands of criminals) encrypted communication, but through a public P2P (peer-to-peer) network, which makes it almost impossible to completely destroy this botnet !!

The average user does not have much left but to watch what he does on the Internet and uses several antiviruses and antispyware programs he regularly scans his computer and hopes for the best.

In the video below, experts from Microsoft and other organizations explain how the botnet works and how Microsoft and Pfizer brought down the "Rustock" botnet, a notorious source of spam, fraud, and cybercrime.

Comments

Popular this month

Chrome crashed in Pwn2Own

Google's Chrome browser crashed during the Pwn2Own competition. Yesterday, the first of three days of the competition was held. Although Pwn2Own has been untouchable in the past two years , the French team, Vupen, was the first to show the existence of two weak points within this browser when it runs on the Windows 7 operating system.

Mobile Browsers

The Internet on mobile devices is becoming more popular and has more and more users. As mobile internet expands, so do mobile browsers. Although the devices themselves already have built-in basic internet browsers, new browsers are constantly appearing. The reason is that each of the programs brings something new and useful. For example, Opera Mini is most popular on older phone models that use Java applications, while on Android platforms Chrome , Firefox ,  Dolphin , and xScope are more represented.

Nintendo server hacked!

Problems with hackers are no longer just PlayStation 3 exclusives. Nintendo confirmed yesterday that their Nintendo America server was hacked but that no information or data was compromised during the attack.

The first Lion update

As part of a software update released yesterday, Apple released OS X 10.7.1 , the first update for their operating system that carries patches for several security vulnerabilities and bugs that accompanied the initial release.

Sony Xperia Z5 Dual Sim review [video + images]

The Xperia Z5 is another great flagship model from the Z family of devices that Sony launched in September this year, about a month ago. The case design is great . The side edges are slightly curved to make the phone fit better in the hand, and the back of the device has a fine finish so there are no glare and fingerprints.