ClueBot NG Report Interface

// Viewing 1794713

Navigation

ID: 1794713
User: 204.228.117.197
Article: Malware
Diff:
(Tagging 2 dead links using Checklinks)
(Purposes)
Line 27: Line 27:
 
Since the rise of widespread [[broadband]] [[Internet]] access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread [[computer virus|viruses]] and worms have been designed to take control of users' computers for black-market exploitation.<ref>{{cite web|title=Malware Revolution: A Change in Target|url=http://technet.microsoft.com/en-us/library/cc512596.aspx|date=March 2007}}</ref> Infected "[[zombie computer]]s" are used to send [[email spam]], to host contraband data such as [[child pornography]],<ref>{{cite web|title=Child Porn: Malware's Ultimate Evil|url=http://www.itworld.com/security/84077/child-porn-malwares-ultimate-evil|date=November 2009}}</ref> or to engage in [[distributed denial-of-service]] [[Attack (computing)|attacks]] as a form of [[extortion]].<ref>[http://www.pcworld.com/article/id,116841-page,1/article.html PC World - Zombie PCs: Silent, Growing Threat<!-- Bot generated title -->].</ref>
 
Since the rise of widespread [[broadband]] [[Internet]] access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread [[computer virus|viruses]] and worms have been designed to take control of users' computers for black-market exploitation.<ref>{{cite web|title=Malware Revolution: A Change in Target|url=http://technet.microsoft.com/en-us/library/cc512596.aspx|date=March 2007}}</ref> Infected "[[zombie computer]]s" are used to send [[email spam]], to host contraband data such as [[child pornography]],<ref>{{cite web|title=Child Porn: Malware's Ultimate Evil|url=http://www.itworld.com/security/84077/child-porn-malwares-ultimate-evil|date=November 2009}}</ref> or to engage in [[distributed denial-of-service]] [[Attack (computing)|attacks]] as a form of [[extortion]].<ref>[http://www.pcworld.com/article/id,116841-page,1/article.html PC World - Zombie PCs: Silent, Growing Threat<!-- Bot generated title -->].</ref>
   
Another category of malware has emerged, called [[spyware]]. These programs are designed to monitor users' web browsing, display unsolicited advertisements, or redirect [[affiliate marketing]] revenues to the [[spyware]] creator. Spyware programs do not spread like [[computer virus|viruses]]; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer applications.<ref>{{cite web|title=Peer To Peer Information|url=http://oit.ncsu.edu/resnet/p2p|publisher=NORTH CAROLINA STATE UNIVERSITY|accessdate=25 March 2011}}</ref>
+
Another category of malware has emerged, called [[spyware]]. These programs are designed to monitor users' web browsing, display unsolicited advertisements, or redirect [[affiliate marketing]] revenues to the [[spyware]] creator. Spyware programs do not spread like [[computer virus|viruses]]; instead they are generally installed by exploiting security holes. They can also be packaged together with user-installed software, such as peer-to-peer applications.<ref>{{cite web|title=Peer To Peer Information|url=http://oit.ncsu.edu/resnet/p2p|publisher=NORTH CAROLINA STATE UNIVERSITY|accessdate=25 March 2011}}</ref> MALWARE/SPYWARE
   
 
==Proliferation==
 
==Proliferation==
Reason: ANN scored at 0.940681
Reporter Information
Reporter: JimmiXzS (anonymous)
Date: Friday, the 14th of October 2016 at 09:45:52 AM
Status: Reported
Sunday, the 4th of January 2015 at 02:51:35 AM #97438
horny (anonymous)

kBQhfl http://www.QS3PE5ZGdxC9IoVKTAPT2DBYpPkMKqfz.com

Friday, the 14th of October 2016 at 09:45:57 AM #106450
JimmiXzS (anonymous)

XSvVOZ http://www.FyLitCl7Pf7kjQdDUOLQOuaxTXbj5iNG.com

Username:
Comment:
Captcha: