The U.S. government was justified to take control of Coreflood bot servers.
Two recent botnet takedowns have demonstrated why going on the offensive is a viable way to cleanse compromised computers. But such tactics may set questionable precedents.
A new strategy used by the U.S. government to disassemble the notorious Coreflood bonet has some wondering whether a poor precedent was set.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- Amedisys notifies nearly 7,000 individuals of potential breach
- Obama orders new sanctions program to deter foreign cyber attackers
- 'Volatile Cedar' APT group spies on enterprises, focusing on Lebanese companies
- Orgs need to share info, crave more board oversight, study says
- Human error cited as leading contributor to breaches, study shows
- Nite Ize website attack impacts credit cards, possibly customer database