Featured Articles

Intel takes credit for three-way 4K gaming

Intel takes credit for three-way 4K gaming

All of a sudden Intel is talking about desktop gaming like there is no tomorrow and it is pushing it. The…

More...
Nvidia Shield Tablet 32GB 4G LTE out for pre orders

Nvidia Shield Tablet 32GB 4G LTE out for pre orders

Nvidia has finally revealed the shipping date of its Shield Tablet 32GB in 4G LTE flavour and in case you pre-order…

More...
Apple announces its Apple Watch

Apple announces its Apple Watch

Apple has finally unveiled its eagerly awaited smartwatch and surprisingly it has dropped the "i" from the brand, calling it simply…

More...
Skylake 14nm announced

Skylake 14nm announced

Kirk B. Skaugen, Senior Vice President General Manager, PC Client Group has showcased Skylake, Intel’s second generation 14nm architecture.

More...
Aerocool Dead Silence reviewed

Aerocool Dead Silence reviewed

Aerocool is well known for its gamer cases with aggressive styling. However, the Dead Silence chassis offers consumers a new choice,…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Friday, 24 June 2011 14:00

Cops shut down malware botnet

Written by Nick Farell


Hacked a million computers
Cops in the US and seven other countries have shut down a cybercrime ring responsible for $US74 million in losses to more than 1 million computer users.

According to the Untouchables Operation Trident Tribunal targeted criminal networks preying on computer users through scareware. According to AP, coppers in Britain, France, Germany, the Netherlands, Sweden, Latvia and Lithuania were involved in the raids.

In Minneapolis two were charged with wire fraud, conspiracy and computer fraud. Peteris Sahurovs, 22, and Marina Maslobojeva, 23, were arrested in Rezekne, Latvia. The two allegedly created a phony advertising agency and claimed they represented a hotel chain that wanted to buy online ad space on the Minneapolis Star Tribune's news website.

When the ad began running on the website, the defendants changed the code in the ad so that visitors to the Star Tribune website were infected with a software program that launched the scareware.

More here.

 

Nick Farell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments