Zombie Cell Phones Redding CA

Typically, a botnet is a network of personal computers that, unbeknownst to their owners, have been infected with software that can be used to send spam or execute cyber attacks. It is estimated that one in four personal computers in the United States is part of a botnet.For the first ...

Sterling Commerce Inc
(925) 296-1800
2175 N California Boulevard # 425
Walnut Creek, CA
Services
Internet Services, Help Desk Services, Computer Hardware and Supplies, Computer Software, Computer and Software Stores

Data Provided by:
A P Rojas Network Solutions
(619) 575-6075
832 9th Street
Imperial Beach, CA
Services
Computer Software, Computer Network Hardware, Computer Networks

Data Provided by:
Motorola Broadband Solutions
(510) 420-7400
6001 Shellmound Street # 4
Emeryville, CA
Services
Marketing Sales, Computer Software, Computer Network Hardware, Computer Networks, Communications Services

Data Provided by:
Fortune Technologies
(408) 530-9600
1214 Apollo Way
Sunnyvale, CA
Services
Internet Products and Services, Internet Services, Computer Hardware and Supplies, Computer Software, Internet Software Design and Services

Data Provided by:
SunCloud Software SuperStore
(530) 532-1790
28 Sun Cloud Circle
Oroville, CA
Services
Computer and Equipment Dealers, Computer Hardware and Supplies, Computer Software, Computer and Software Stores, Computer Training

Data Provided by:
Right Click Computer Center
(951) 929-1201
4000 E Florida Avenue
Hemet, CA
Services
Computer and Equipment Dealers, Computer Hardware and Supplies, Computer Software, Computer Technology Schools, Computer Training

Data Provided by:
Advance Micro Technology
(510) 903-9567
5103 Sienna Trail
Oakland, CA
Services
Computers and Equipment Repair and Maintenance, Computer Software, Computer Network Hardware, Computer Networks, Semiconductor Manufacturers Equipment and Supplies

Data Provided by:
Gryphon Network Technologies Inc.
(818) 270-8538
1746-F South Victoria Ave. #208
Ventura, CA
Services
Computers and Equipment Repair and Maintenance, Computer Consultants, Computer Hardware and Supplies, Computer Software, Computer Systems Consultants and Designers
Hours
Mon-Fri: 09:00 AM-06:00 PM

Data Provided by:
Netsource Communications
(818) 343-2004
6011 Reseda Boulevard
Tarzana, CA
Services
Architects, Computer Software, Computer Network Hardware, Computer Networks

Data Provided by:
Power Integrations Inc
(408) 414-9200
5245 Hellyer Avenue
San Jose, CA
Services
Marketing Sales, Electric Equipment & Supplies Dealers, Computer Software

Data Provided by:

Zombie Cell Phones

Provided By:

Zombie cell phones!

Posted by Caitlin on July 22nd, 2009

Thanks for visiting the NextAdvisor Daily blog. You may want to subscribe to our RSS feed .

Typically, a botnet is a network of personal computers that, unbeknownst to their owners, have been infected with software that can be used to send spam or execute cyber attacks. It is estimated that one in four personal computers in the United States is part of a botnet.

For the first time ever , it seems that hackers have successfully created a botnet that runs on cell phones, rather than computers. Symantec has drawn attention to "Sexy Space," a virus that spreads from one phone to another by sending text messages with a link included. The messages read, "A very sexy girl, Try it now!" and the link asks the user to download software which, of course, infects the user's cell phone and sends the same message to the user's contacts. Viruses that spread through text messages and infect cell phones have been seen before, but the "Sexy Space" virus is unusual in that it communicates with a central server and can be controlled by its creators. If the hackers issue commands to the network of infected phones, it would be considered a true botnet, the first of its kind. How this network of zombie cell phones will be used remains to be seen.

Security software for phones is still being developed. In the meantime, it's crucial for users to be aware of the risks, and avoid downloading unknown software. Be sure to protect your computer with Internet security software , and consider investing in identity theft protection .

Click here to read more from Next Advisor