Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

Grum botnet eliminated!

Grum botnet eliminated!

A botnet that experts believe sent 18% of the world's spam e-mail messages was recently shut down, according to a report by a security firm.

Grum's control servers were mostly based in Panama, Russia, and Ukraine. Security company FireEye and spam monitoring service SpamHaus worked in cooperation with local Internet service providers and shut down the illegal network. A botnet is a network of computers that have been hijacked by cybercriminals, in most cases using malicious software.

FireEye security researcher, Atif Mushtaq, states that the takedown of Grum is the result of the joint effort of a large number of people and that this cooperation sends a strong message to all spammers. Mushtaq states that at the beginning of the week he found out that the Dutch server that was part of Grum was also shut down, which was followed by positive news about the shutdown of the server in Panama, however, Grum started its activities again, but this time from the territory of Ukraine.

Shutting down Groom represents one of the largest efforts to neutralize botnets worldwide. Russian Georgiy Avanesov was jailed for four years in May this year for being the mastermind behind the Bredolab botnet, which is believed to have generated more than £80,000 a month in revenue.

Microsoft has been working to disable Zeus, another major network responsible for the theft of several million pounds. FireEye also worked with other experts around the world to put as much pressure as possible on local ISPs to suspend illegal operations. Mushtaq states that more than 20,000 computers are still part of the botnet, but that without active CnC, they too will soon become ineffective.

The downing of Grom represents a big step forward in combating the spread of botnets around the world, Mushtaq believes, since there is no paradise for such activities anywhere. Most of the spam botnets that kept their CNC in the USA and Europe have moved to countries like Panama, Russia, and Ukraine thinking that nobody can do anything to them in these territories but now it is possible to pressure local internet providers to deny them service and thus help eliminate such illegal networks.

Comments

Popular this month

The Galaxy Note was ridiculed when it appeared, and now…

Did you know that the first Samsung Galaxy Note was ridiculed by users and the media? Everyone laughed at his "huge" case and said that it would fall apart immediately after it appeared. They said that it was too big and that such a phone would never be used every day.

The difference between Sleep, Hibernate and Hybrid sleep options

What is the difference between regular Sleep mode and Hybrid sleep mode? And what is Hibernate ? I will try to explain in the simplest way possible so that everyone understands nicely. 1. Sleep When you select Sleep mode , all components of the computer except RAM are shut down to store data. So, if you do something on the computer and press Sleep, the computer shuts down and everything you did (left open windows, documents, etc.) is stored in RAM.

What is GLONASS?

If you've looked at the detailed specification of an Android or GPS device, you may have seen another term next to the GPS tag and didn't know exactly what it represents. Well,  GLONASS is a global navigation system that was started by the USSR in 1976, so this project could be taken over by Russia after the collapse of the Soviet Union.

Update for IE9

Microsoft has released a new update for Internet Explorer 9 that brings patches for several different security vulnerabilities.

Google highlights the problems

Google has released a new study detailing how it is becoming increasingly difficult to identify harmful websites and attacks as antivirus programs increasingly prove to be an ineffective defense against new types of attacks.