The U.S. government was justified to take control of Coreflood bot servers.
Two recent botnet takedowns have demonstrated why going on the offensive is a viable way to cleanse compromised computers. But such tactics may set questionable precedents.
A new strategy used by the U.S. government to disassemble the notorious Coreflood bonet has some wondering whether a poor precedent was set.
Sign up to our newsletters
SC Magazine Articles
- FireEye: First multi-vendor ATM malware targeting cardholders
- Customer data possibly compromised in online photo store malware attack
- Excellus BlueCross BlueShield announces breach, 10.5M records at risk
- CVS employee steals data on 55K Molina Healthcare members
- False Facebook 'dislike button' ensnares users
- Stored XSS vulnerability identified in Jetpack plugin for WordPress
- Experian, T-Mobile breach exposes 15 million customers, but what will happen to the data?
- Only a matter of time before cyber-attack hits broader finance
- Don't spend more, spend better: Interview with FireEye's Richard Turner
- Landmark European data protection judgement