Botnets and their masters can communicate with each other by calling into the same VoIP conference call and swapping data using touch tones, researchers demonstrated at Defcon. This gives the botmasters, whose top goals include remaining anonymous, the ability to issue orders from random payphones and disposable wireless handsets, said researchers Itzik Kotler and Iftach Ian Amit of security and risk assessment firm Security Art. Using phones and the public phone networks eliminates one of […]
botnets
Offloading your software and data to a cloud computing service has never been easier. Apple last week became the latest tech company – after Google and Amazon – to offer cheap online storage, with its new iCloud service allowing users to access music, documents and other files from any Apple device. But cloud services could also be used to launch attacks, send spam and commit fraud. “Right now it’s just a few attacks, most aren’t […]
A spike in attacks against IP PBXs that started last fall shows no signs of abating, spawning speculation that those responsible have tapped into botnets and cloud computing resources to carry out their illegal activities. According to separate security reports from Cisco and Sipera’s Viper Lab research arm, the exploits are carried out using techniques that lend themselves to the interpretation that the attackers are tapping into broad resources that make their work more effective. […]