Access your Pro+ Content below.
Botnets and machine learning: A story of hide and seek
This article is part of the MicroScope issue of March 2019
Malware authors have always been trying to update their software and evolve their techniques to take advantage of technologies and bypass security measures. Botnets are a perfect example of how cyber criminals have managed to accomplish that over the past decade. Their widespread and severe consequences have transformed botnets into one of the most significant and destructive threats in the cyber security landscape, as they are responsible for many large-scale and high-profile attacks. Examples of attacks performed by botnets include distributed denial of service (DDoS), personal or classified data theft, spam campaigns, cryptocurrency mining and fake news spreading on social media platforms. Moreover, there is an exponential increase in attacks that result from crime-as-a-service offerings, which usually include botnets that are rented or sold to people or groups lacking experience or technical skills who wish to perform nefarious activities. So, it is clear that taking security measures against botnets is crucial for an ...
Access this MicroScope+ Content for Free!
Features in this issue
In the first part of our coverage of the MicroScope roundtable on SD-WAN, the speakers scope out the market and the opportunity for the channel
As security practitioners develop new ways to keep cyber threats at bay, so malware authors continue to update their software and evolve their techniques to take advantage of new technologies and bypass security measures. Machine learning has proved to be a powerful ally in the battle against malware
Avaya’s comments about increasing revenues via partners have got the thumbs-up from Billy MacInnes, who hopes it will act as an example to others