991
Sponsored by:
Sponsored by:

Malicious Code?

Thread Tools
 
Rate Thread
 
Old Sep 10, 2014 | 11:58 AM
  #16  
Christophosphorus's Avatar
Registered User
Joined: Nov 2013
Posts: 912
From: California
Rep Power: 56
Christophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to behold
Originally Posted by ChuckJ
It's amazing that the Government can't identify those that are putting these scams on the internet and block their IP address from entering the internet and then if they are in the US prosecute them. Personally I think this is a higher priority than stopping all use of marijuana.

ChuckJ
Originally Posted by rnl
The problem is that the malicious code probably does not originate in US and they spoof their IP addresses. All day long we get spam phone calls at the office. The caller ID shows a local number that turns out is not in service. We block the numbers and in about month they change their caller ID.

War on drugs or war on cyber criminals? Yeah I agree but it's not going to happen. Perhaps the best solution is .... Private enterprise. Internet providers need to be more aggressive in hunting down these thieves and providing an easy way for consumers to report cyber crime activity. I called Comcast to report the flash pop up and spoke with a person who "understood" my "frustration". Total waste of my time
Neither an unlimited budget, nor the largest tech savvy team of criminal specialists, would be able to stop these. There are literally thousands upon thousands of cyber attacks that take place every hour, and each and every attack take advantage of a single vulnerability in software code.

The ones we're getting for Adobe are actually quite obvious. I just received another one earlier this morning and realized that the entire pop-up is within an external site with a non-https header.
 
Old Sep 10, 2014 | 02:09 PM
  #17  
ChuckJ's Avatar
Registered User
Joined: May 2010
Posts: 2,806
From: Dallas
Rep Power: 176
ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !
But don't you think if we caught a few of these guys and put them in jail (and told everyone we did that) we would stop a few? It seems we take only defensive actions that support software security companies. What is their motivation? Are they making money doing this?

ChuckJ
 
Old Sep 10, 2014 | 02:14 PM
  #18  
Christophosphorus's Avatar
Registered User
Joined: Nov 2013
Posts: 912
From: California
Rep Power: 56
Christophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to beholdChristophosphorus is a splendid one to behold
Originally Posted by ChuckJ
But don't you think if we caught a few of these guys and put them in jail (and told everyone we did that) we would stop a few? It seems we take only defensive actions that support software security companies. What is their motivation? Are they making money doing this?

ChuckJ
That argument can apply to so many situations (harsh punishments leading to behavior changes). As much as I agree, it's going to be impossible to catch most of these individuals. They operate behind multiple layers of anonymity and re-routes, so you're lucky if you can actually pinpoint a single person responsible for a "malware" attack.

Motivation? It depends. Some are genuine scammers who trick the unknowing individual into entering CC information or bank logins. Others are doing it for the rush.

Either way, it is ridiculously easy to convince someone that their Wells Fargo account has been compromised, and that a "password reset" is needed. For every 10,000 e-mails a bot sends out, even a single person who falls for the bait can make a hacker's day.
 
Old Sep 10, 2014 | 03:04 PM
  #19  
ChuckJ's Avatar
Registered User
Joined: May 2010
Posts: 2,806
From: Dallas
Rep Power: 176
ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !ChuckJ Is a GOD !
Originally Posted by Christophosphorus
That argument can apply to so many situations (harsh punishments leading to behavior changes). As much as I agree, it's going to be impossible to catch most of these individuals. They operate behind multiple layers of anonymity and re-routes, so you're lucky if you can actually pinpoint a single person responsible for a "malware" attack.

Motivation? It depends. Some are genuine scammers who trick the unknowing individual into entering CC information or bank logins. Others are doing it for the rush.

Either way, it is ridiculously easy to convince someone that their Wells Fargo account has been compromised, and that a "password reset" is needed. For every 10,000 e-mails a bot sends out, even a single person who falls for the bait can make a hacker's day.
What a shame!

ChuckJ
 
Related Topics
Thread
Thread Starter
Forum
Replies
Last Post
Mathme
Cayenne 958
4
Mar 23, 2016 11:47 AM
PelicanParts.com
997 Vendor Classifieds
1
Oct 5, 2015 01:07 PM
nagual911
997 Turbo / GT2
5
Oct 1, 2015 01:52 AM



You have already rated this thread Rating: Thread Rating: 0 votes,  average.


All times are GMT -6. The time now is 01:37 PM.