Good Guys Attack ZeuS Botnet, Botnet Comes Back to Life

Security researchers thought they had an opportunity to take down the ZeuS botnet, one of the largest on the planet, by cutting off connectivity to the Kazakstan Internet service provider AS Troyak, which provided network services to six ISPs hosting Zeus command-and-control servers. And when researchers pulled the plug, the initial reaction looked promising: up to 25 percent of the ZeuS botnet’s systems appeared to go offline overnight. But 24 hours later, it looks like the botnet operators are largely back in control, and ZeuS is continuing to operate.

good guys attack zeus botnet comes back to life zues traffic dropoff

No one knows how large the ZeuS botnet is, but estimates place it in the millions of machines. ZeuS’s primary purpose is usually to steal passwords and bank login credentials. Cisco researchers indicated that as many as 68 command-and-control servers for the ZeuS botnet were taken down; however, within 24 hours it appeared most of ZueS’s command infrastructure was back online via new network providers. Cisco noted that there was a spike in traffic to the targeted servers the weekend before the takedown, which might have indicated the botnet operators had advance warning they were going to lose connectivity.

Botnets are comprised of machines infected by malware which can be controlled from a remote source via the Internet; botnets typically spread via malware on Web sites, social networking services, and email: once infected, botnet controllers can then use the infected machine to send spam and additional malware. They can also scan the data on the infected machines and log users’ activity, scanning for passwords, account numbers, and other sensitive information. For Windows users, the best defense against botnets and other malware is a reliable, up-to-date antivirus and security software package.

The AS Troyak takedown was intended to sever the connection between infected computers and the Internet-based machines that controlled them.

The takedown-and-recovery of the ZueS botnet highlights the cat-and-mouse nature of security researchers’ and law enforcements’ battle with cybercriminals and botnet operators. Even when command-and-control systems can be isolated from the botnets they control, online criminals are often and to shift their operations and resume control of infected machines in a short period of time.

[Chart from ZueSTracker at]

Product Review

Bigger. Smarter. Louder. The Echo Plus makes Alexa sound better than ever

Amazon’s second-generation Echo Plus speaker is the loudest, bassiest speaker in the Echo fleet. While featuring a smart hub with only Zigbee connectivity, other upgrades make this device a worthy smart speaker.

Apple CEO demands Bloomberg retract its Chinese surveillance story

Apple CEO Tim Cook is calling on Bloomberg to retract a story alleging that Apple had purchased compromised servers that allowed the Chinese government to spy on Apple. Apple's investigation found no truth to the story.

Apple’s latest feature ensures MacOS apps are safer than ever

MacOS is mythically known for being more immune to viruses than Windows, but that doesn't mean there isn't room to make it safer. Apple is using an app notarization feature to protect users from downloading malicious apps.

Protecting your PDF with a password isn't difficult. Just follow these steps

If you need to learn how to password protect a PDF, you have come to the right place. This guide will walk you through the process of protecting your documents step by step, whether you're running a MacOS or Windows machine.

Google Chrome 70 is finally getting a picture-in-picture mode

Picture-in-picture mode is finally coming to Google Chrome 70 on Mac, Linux, and Windows. The feature not only applies to YouTube but also any other website where developers have chosen to implement it.

Intel's 9th-gen chips could power your next rig. Here's what you need to know

The Intel Core i9-9900K processor was the star of the show for consumers, but a powerful 28-core Xeon processor also led announcements. Here's everything you need to know about the latest Intel chipsets.
Product Review

Dell’s G3 Gaming laptop knows what gamers want, and what they can live without

Compromise and budget gaming laptops go hand-in-hand, but with the G3, Dell has figured out how to balance what gamers want with what they can live without.

Core i9s and Threadrippers are all powerful, but should you go AMD or Intel?

The battle for the top prosumer CPUs in the world is on. In this head to head, we pit the Core i9 versus the Threadripper to see which is the best when it comes to maximizing multi-core performance on a single chip.

Despite serious security flaws, D-Link will (again) not patch some routers

D-Link revealed that it won't patch six router models despite warnings raised by a security researcher. The manufacturer, for the second time in a span of about a year, cited end-of-life policies for its decision to not act.

There’s now proof that quantum computing is superior to the classical variety

For the first time in computer science history, researchers have tangibly demonstrated how a quantum computer is better than a classical computer. A quantum computer was able to solve a math problem that a classical PC cannot.

In 2018, the rivalry between AMD and Intel has become more interesting than ever

When it comes to selecting a CPU for your PC, there's no shortage of chips for you to choose from. With Ryzen, Threadripper, and Core i9 CPUs though, the AMD vs. Intel argument is muddier than ever.

Will Apple introduce a new MacBook at its Oct. 30 event? Here's everything we know

Whether it's called the MacBook Air or just the MacBook, Apple is highly rumored to introduce a new, affordable laptop in 2018. We discuss reports about upgrading displays, processors, sign-in features, and more.
Product Review

Amid a new fleet of budget laptops, the ZenBook 13 sails where others sink

It’s never been truer that you don’t need to spend over a thousand bucks to buy a good laptop. The ZenBook 13 takes we’ve always loved about its predecessor and makes enough small refinements to keep it ahead of its competitors.

Protect your digital identity with these four easy steps to online anonymity

You don't have to be a secret agent or a notorious hacktivist to care about anonymity. Consult this guide to learn tips, tricks, and best practices for staying anonymous and keeping your online activity private