Zombie Cell Phones Redding CA

Typically, a botnet is a network of personal computers that, unbeknownst to their owners, have been infected with software that can be used to send spam or execute cyber attacks. It is estimated that one in four personal computers in the United States is part of a botnet.For the first ...

Local Toolbox
(415) 456-2133
990 A Street # 307
San Rafael, CA
Services
Building Materials and Supplies Dealers, Internet Services, Computer Software, Internet Service Providers, Hardware Dealers

Data Provided by:
Network Gear Exchange
(408) 370-1860
730 Camden Avenue
Campbell, CA
Services
Computer Software, Computer Network Hardware, Computer Networks

Data Provided by:
Compu-Register Systems
(707) 588-0499
871 Bob Crosby Way
Windsor, CA
Services
Computer Consultants, Computer Software, Software Technical Support, Computer Network Hardware, Hardware Dealers
Hours
24-7
Payment Options
MasterCard, Cash, Trades, Cheques, VISA

Data Provided by:
Plimus Inc
(858) 350-7473
3830 Valley Centre Drive #705-294
San Diego, CA
Services
Music Stores, Internet Services, Computer Hardware and Supplies, Computer Software, Software and CD ROM Sales and Services

Data Provided by:
Fanrocket Llc
(310) 657-6400
8721 Santa Monica Boulevard # 630
West Hollywood, CA
Services
Internet Products and Services, Internet Services, Computer Hardware and Supplies, Computer Software, Internet Software Design and Services

Data Provided by:
Flipswap
(310) 618-8877
2771 Plaza Del Amo # 807
Torrance, CA
Services
Internet Products and Services, Internet Services, Computer Hardware and Supplies, Computer Software, Internet Software Design and Services

Data Provided by:
Netsource Communications
(818) 343-2004
6011 Reseda Boulevard
Tarzana, CA
Services
Architects, Computer Software, Computer Network Hardware, Computer Networks

Data Provided by:
Advance Micro Technology
(510) 903-9567
5103 Sienna Trail
Oakland, CA
Services
Computers and Equipment Repair and Maintenance, Computer Software, Computer Network Hardware, Computer Networks, Semiconductor Manufacturers Equipment and Supplies

Data Provided by:
Carmel Worldwide Corp.
(626) 981-2294
PO Box 1043
Claremont, CA
Services
Cigars Cigarettes and Tobacco Wholesale and Manufacturers, Computer Hardware and Supplies, Computer Software

Data Provided by:
Service Plus Network
(707) 226-6840
607 Airpark Road # B
Napa, CA
Services
Computer Software, Computer Network Hardware, Computer Networks

Data Provided by:
Data Provided by:

Zombie Cell Phones

Provided By:

Zombie cell phones!

Posted by Caitlin on July 22nd, 2009

Thanks for visiting the NextAdvisor Daily blog. You may want to subscribe to our RSS feed .

Typically, a botnet is a network of personal computers that, unbeknownst to their owners, have been infected with software that can be used to send spam or execute cyber attacks. It is estimated that one in four personal computers in the United States is part of a botnet.

For the first time ever , it seems that hackers have successfully created a botnet that runs on cell phones, rather than computers. Symantec has drawn attention to "Sexy Space," a virus that spreads from one phone to another by sending text messages with a link included. The messages read, "A very sexy girl, Try it now!" and the link asks the user to download software which, of course, infects the user's cell phone and sends the same message to the user's contacts. Viruses that spread through text messages and infect cell phones have been seen before, but the "Sexy Space" virus is unusual in that it communicates with a central server and can be controlled by its creators. If the hackers issue commands to the network of infected phones, it would be considered a true botnet, the first of its kind. How this network of zombie cell phones will be used remains to be seen.

Security software for phones is still being developed. In the meantime, it's crucial for users to be aware of the risks, and avoid downloading unknown software. Be sure to protect your computer with Internet security software , and consider investing in identity theft protection .

Click here to read more from Next Advisor