Security

Botnets: The Clone Army of Cybercrime

Provided by CYREN

Category Security

Type Analyst Report

Length 27

Publish Date December 16 0018

Date posted January 12 2017

Overview

Last year we seemed to be constantly under threat from potential ransomware attacks but over the last few months, an underlying cyberthreat has started to gain prominence – botnets. Major DDoS attacks were launched and with the publication of the Mirai source code, cybercriminals across the globe had the ability to build as many botnets as they liked. This white paper takes an in depth look at the growing threat that botnets pose and discusses self-defense methods to help you detect botnets within your own network.

Recommended for You

dan2

US ‘hacking back’ law could create a cyber wild west of vigilantism

Dan Swinhoe casts a critical eye on the future

kathryn-cave

A c-suite guide to blockchain 2018

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?