All Vietnamese users should know about botnets
The Internet world is growing, which means the emergence of botnets filled with dangers.
The Internet world is growing, which means the emergence of botnets filled with dangers. The number and size of botnet is increasing, they not only penetrate into personal computers but also start showing signs of entering the mobile world . The appearance of 'pandemic' Conficker in the early months of the year has made the world of security go crazy, they set up an unprecedented giant botnet system ever.
The community of botnets is fighting constantly to scramble for the most bots, the most bandwidth, and the largest number of infected computers. In 2008, an average of 60 billion spam messages were sent from the botnet a day. Microblogs like Twitter and Facebook are also gradually being turned into botnets to spread malicious code and spam. Botnets designed to attack Mac OS X operating systems have also been sparked.
What are the signs that a computer has a botnet?
Artwork There are many signs that the computer is infected with malicious code and becomes a bot in the botnet:
- Computer processing speed decreases.
- Internet access speed becomes extremely slow.
- Continuous pop-up ads appear.
- Suddenly infected with many different types of malicious code.
- Spike Internet access capacity (monitored by the bandwidth monitor program, monitor whether the router light blinks continuously)
CMC Recommendation InfoSec how to detect and avoid botnets:
Bots can spread themselves through operating system vulnerabilities and hijack users' machines. In addition, some bots do not have a feature that spreads, so it needs a virus.
For individual users
Most bot attacks are aimed at single individual users, university servers or small business networks. Because computers in these places are not closely monitored, it is often weak to protect the immunity policy of these machines. To avoid being infected with a botnet, users should:
- Scan the device periodically with CMC Internet Security or other antivirus software, always ensure they are updated to the latest versions.
- Monitor and update patches for operating systems and Internet access applications regularly.
- Using copyrighted software, do not use crack / patch files floating on the Internet
- Be careful when opening strange files of unknown origin or unknown reliability (from email, chat, internet links)
- Do not access strange web links.
- Reconfigure browsers.
- Improve knowledge of using computers to avoid fraudulent tricks (sending exe files with icons such as JPG or DOC files for users to open)
For corporate administrators:
- Regularly update information on the latest security holes
- Need to raise awareness for users about security issues and security policies
- Study routine logs (log records) created by IDS and many firewalls, mail servers, proxy servers to help detect abnormal traffic, a sign of bot presence and so on timely preventive measures.
However, the best defense and protection against botnet attacks is the users themselves and their perceptions.
You should read it
- How the botnet works
- Test information about Internet Explorer browser
- What is a botnet, who does it use to attack, and how can you prevent botnet?
- GoldBrute botnet campaign is trying to hack 1.5 million RDP servers worldwide
- Multiple choice questions on the Internet P5
- What is botnet DDoS?
- The rise of Botnet IoT and how to protect smart devices
- Microsoft has just taken down a huge botnet network
- How the botnet works (Part 2)
- Microsoft dismantled the ZLoader botnet, naming key members as a deterrent
- Discover botnet hiding YouTube shadow stealthily deploying malicious activities
- Avoid threats from the Internet
Maybe you are interested
What is a BBS file? PUBG Mobile 0.15.5 launches, updates new jungle maps, new female characters, new guns What's new in the update PUBG Mobile 0.13.5 Which mini dough mixer is good for home use? Top 4 best-selling non-oil fryer in 2019 8 mistakes when writing a CV that put you at risk of long-term unemployment