Storm and the Future of Social Engineering 77
Albert writes "Storm shows several key characteristics, some new and advanced. It uses cunning social engineering techniques — such as tying spam campaigns to a current event or site of interest — as well as a blend of email and the Web to spread. It is highly coordinated, yet decentralized — and with Storm using the latest generation of P2P technology, it cannot be disabled by simply 'cutting off its head.' In addition, Storm is self-propagating — once infected, computers send out massive amounts of Storm spam to keep recruiting new nodes."
aim lower, for the honour of the old school (Score:1, Funny)
Sounds like Prey (Score:4, Funny)
http://en.wikipedia.org/wiki/Prey_(novel) [wikipedia.org]
Lets get the ISPs involved! (Score:5, Funny)
Since the article mentions "and with Storm using the latest generation of P2P technology"
I think the only reasonable solution to this is to for all of us to call our ISPs and demand that this "P2P" thing be either throttled back or somehow forced to stop, perhaps by sending out fake RST packets whenever the ISP sees "P2P traffic. Yeah, let's all do that so we can nip this Storm bot in the bud.
Re:Why. . ? (Score:1, Funny)
Never give out your password... (Score:3, Funny)
Re:Self created problem? (Score:3, Funny)
Re:How is this news? (Score:5, Funny)
Re:Self created problem? (Score:3, Funny)
Re:Never give out your password... (Score:2, Funny)