The Evolution of Spam, Part 2: New Defenses By Andrew Burger
16 Nov 2007
November 16, 2007 -- Spam network operators, otherwise known as "botnet herders," are becoming increasingly proficient at evading detection and harnessing the power of peer-to-peer (P2P) computing, much to the consternation of spam detection, prevention and IT security specialists, as Part 1 of this series discusses.
Botnet operators are using spam and recipients' "zombie" PCs to create what amounts to a "shadow" Internet and growing rich in the process. What's more troubling is that the problem is not likely to go away soon. Legitimate companies and businesses are making use of the same spam artists and botnet operators who manage the P2P networks that are also distributing malware. Meanwhile, lax enforcement regimes make the problem much more difficult to combat. Read more...