Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Botnets, how do they work? Architectures and case studies – Part 2

$
0
0

In the first part of this of this mini-series on the botnet cyber threat, we have shown the current scenario and the technological evolution in security landscape. Malicious architectures are increasingly becoming one of the principal problems for security experts. Click here to see previous article.

Various researches conducted by principal security firms have revealed the use of botnets for different purposes. The most interesting architectures are designed for the following scope

read more.....http://resources.infosecinstitute.com/botnets-how-do-they-work-architectures-and-case-studies-part-2/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+infosecResources+(InfoSec+Resources)

Viewing all articles
Browse latest Browse all 8064

Trending Articles