<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Explaining Botnets</title>
	<atom:link href="http://www.gfi.com/blog/explaining-botnets/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/explaining-botnets/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=explaining-botnets</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Artie Gains</title>
		<link>http://www.gfi.com/blog/explaining-botnets/comment-page-1/#comment-29344</link>
		<dc:creator>Artie Gains</dc:creator>
		<pubDate>Sun, 10 Jul 2011 07:32:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3219#comment-29344</guid>
		<description><![CDATA[At least botnets should be relatively easy to catch - they are so noisy (i.e. they use so many resources) that one must be blind not to notice them. This isn&#039;t unimportant, having in mind how stealth some of the other dangerous types of malware are.]]></description>
		<content:encoded><![CDATA[<p>At least botnets should be relatively easy to catch &#8211; they are so noisy (i.e. they use so many resources) that one must be blind not to notice them. This isn&#8217;t unimportant, having in mind how stealth some of the other dangerous types of malware are.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/explaining-botnets/comment-page-1/#comment-29016</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 19 Apr 2011 13:57:28 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3219#comment-29016</guid>
		<description><![CDATA[Yes I agree Tiffany, preventing one intrusion will probably pay for any extra cost you might ever incur in hiring a good network administrator!]]></description>
		<content:encoded><![CDATA[<p>Yes I agree Tiffany, preventing one intrusion will probably pay for any extra cost you might ever incur in hiring a good network administrator!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tiffany Pria</title>
		<link>http://www.gfi.com/blog/explaining-botnets/comment-page-1/#comment-29004</link>
		<dc:creator>Tiffany Pria</dc:creator>
		<pubDate>Sun, 17 Apr 2011 14:40:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3219#comment-29004</guid>
		<description><![CDATA[Botnets are NOT only dangerous, they are also financial disasters. Many small, medium, and large businesses are the favorite targets of botnets for an obvious reason - to steal sensitive information and data and sell to others (to competitors, spammers, etc).

As a business owner myself, updating your OS, virus database, and programs to the latest version will not be enough. You must be vigilant and knowledgeable also. 

If you have or if you are running a company (whether it&#039;s small, medium, or large), you must hire an excellent network administrator and / or IT manager. They maybe expensive, but I always believe that prevention is better that cure.]]></description>
		<content:encoded><![CDATA[<p>Botnets are NOT only dangerous, they are also financial disasters. Many small, medium, and large businesses are the favorite targets of botnets for an obvious reason &#8211; to steal sensitive information and data and sell to others (to competitors, spammers, etc).</p>
<p>As a business owner myself, updating your OS, virus database, and programs to the latest version will not be enough. You must be vigilant and knowledgeable also. </p>
<p>If you have or if you are running a company (whether it&#8217;s small, medium, or large), you must hire an excellent network administrator and / or IT manager. They maybe expensive, but I always believe that prevention is better that cure.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/explaining-botnets/comment-page-1/#comment-28975</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 12 Apr 2011 10:21:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3219#comment-28975</guid>
		<description><![CDATA[Off the top of my head I am not aware of actual legal action against victims of botnets; however, these things can be tricky in that when such legal action is taken the victim will be sued for the action taken by the botnet (DDOS attack, hacking attempts etc..) so it might be tricky to find such examples.

I am, however, aware of a case where a botnet introduced a malware onto a victim&#039;s computer, the malware piggybacked a legitimate transaction on the online bank of the victim and transfered the money from that account to the attacker&#039;s account. The bank was unable to reverse the transfer and refused to refund the victim claiming that it was their responsibility to keep their computer safe.]]></description>
		<content:encoded><![CDATA[<p>Off the top of my head I am not aware of actual legal action against victims of botnets; however, these things can be tricky in that when such legal action is taken the victim will be sued for the action taken by the botnet (DDOS attack, hacking attempts etc..) so it might be tricky to find such examples.</p>
<p>I am, however, aware of a case where a botnet introduced a malware onto a victim&#8217;s computer, the malware piggybacked a legitimate transaction on the online bank of the victim and transfered the money from that account to the attacker&#8217;s account. The bank was unable to reverse the transfer and refused to refund the victim claiming that it was their responsibility to keep their computer safe.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tony Wescott</title>
		<link>http://www.gfi.com/blog/explaining-botnets/comment-page-1/#comment-28967</link>
		<dc:creator>Tony Wescott</dc:creator>
		<pubDate>Sun, 10 Apr 2011 10:56:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3219#comment-28967</guid>
		<description><![CDATA[Good advice, it&#039;s staggering to think how many people are unwittingly part of a botnet without even realizing it. I think if more people were aware of the enormity of the risks and how common botnet infection is, they wouldn&#039;t be so reckless with their computer security. Is there any legal precedent for those infected with a botnet being included as a defendant for legal action?]]></description>
		<content:encoded><![CDATA[<p>Good advice, it&#8217;s staggering to think how many people are unwittingly part of a botnet without even realizing it. I think if more people were aware of the enormity of the risks and how common botnet infection is, they wouldn&#8217;t be so reckless with their computer security. Is there any legal precedent for those infected with a botnet being included as a defendant for legal action?</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:14:03 by W3 Total Cache --