And still the controversy rages: several people have pointed out that it’s unlikely that the PCs in the BBC’s botnet are all in the UK, suggesting that there could be additional legal issues relating to other jurisdictions. The H reiterated the point that Ofcom regulations state that payment shouldn’t be made to “convicted or confessed
Search results for: "bbc botnet"
[update] Commentary by Larry Seltzer for eWeek: http://www.eweek.com/c/a/Security/The-British-Botnet-Corporation-324874/ I don’t promise that this is my last word on the subject, but, having now seen the full Click programme and the BBC’s response to some of the criticism they’ve received, I found I had a few more things to say on the topic. If you aren’t
Update: several nice, thoughtful blogs on the subject from John Graham at http://john-graham.me.uk/. International law firm Pinsent Mason’s Struan Robertson seems to agree (at least in part) with commentatory in the security industry that the BBC have broken the UK’s Computer Misuse Act. Robertson, focused on the Click program’s unauthorised access to 22,000 bot-compromised PCs in order to
The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police.
Nitol versus Michelangelo: the supply chain is much more than the production line.
You may have gathered from some of the blogs published here last year that i'm not biggest fan of the BBC's "Click" programme. I regard the Beeb's forays into buying botnets and stolen credit card details and making active use of them as at best naive. I agree that people need to be aware of such issues,
The BBC published a self-justification of sorts over the Click fiasco on Friday 13th March: when I came upon it the following morning, I posted a comment there, pointing out Mark Perrow had addressed the issues this industry hadn’t complained about, and ignored the issues that we were concerned about. My comment is number 14,
The Tech Herald have brought it to our attention that Comodo, a security company who include an antivirus product in their range, have backed the BBC’s action in buying and exploiting a botnet for the Click programme’s story. This is clearly swimming against the tide – virtually all the mainstream anti-malware companies who’ve commented have
I spend so much time on this blog, that I’ve been neglecting the other blogs I’m supposed to contribute to from time to time (including my own, though I’ve just started to put some papers up there – more about that later). However, as the issue with the BBC’s possible breach of the UK’s Computer
Law enforcement and malware research join forces to take down cybercriminals
As Internet crime knows no borders, mutual legal assistance involving various nations and, by extension, requests for extraditing suspected cyber-offenders are sometimes part and parcel of prosecution efforts.
In Part 1, our roundup of some of the most notable law enforcement actions against computer crime in the first quarter of 2018 will focus on arrests and charges involving suspected cyber-crooks.
While far behind Bitcoin in market capitalization, Monero has several features that make it a very attractive cryptocurrency to be mined by malware.
A Russian man has been sentenced to five years in prison for helping develop the Citadel malware, which was used to steal personal financial information. It cost more than $5 million in losses.
This article sheds light on the current ecosystem of the Sathurbot backdoor trojan, in particular exposing its use of torrents as a delivery medium and its distributed brute-forcing of weak WordPress administrator accounts.
Lloyds Banking Group fell victim to an attempted cyberattack earlier this month, which saw cybercriminals attempt to crash the online banking service over a two day period.
Brian Krebs’ website appears be to be holding up, following what has been described as “one of the biggest web attacks ever seen”.
Welcome to this week’s security review, which includes Dorkbot, the importance of encryption and how buildings are at threat of cyberattacks.
Ransomware is the latest tool in the cybercriminal’s arsenal, but it has to date largely been used to target consumers. Could it now be used to hit banks and other financial institutions too?
Although it's far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.