Australians go zombie hunting

Powered by SC Magazine
 

A zombie-hunting program has been launched by the ACMA, in a bid to identify infected computers which have Australian internet addresses.

A zombie-hunting program has been launched by the Australian Communications and Media Authority (ACMA), in a bid to identify infected computers which have Australian internet addresses.

The program, dubbed the Australian Internet Security Initiative, is being trialled by the ACMA.

Under the trial program, the ACMA will work with five internet service providers (ISPs) -- Telstra Bigpond, OptusNet, Westnet, Pacific Internet and West Australian Networks.

The ACMA would let the ISPs taking part in the trial know which internet addresses on their networks had been infected, and the ISPs would then contact their customers to advise them what they needed to do to fix the problem, according to a statement from the regulator.

"If the owner either cannot or will not fix the problem and their computer remains a threat to other internet users, the ISPs may take steps under their acceptable use policy to disconnect the computer until the problem is resolved," according to a statement from the ACMA.

Lyn Maddock, acting ACMA chair, said there were millions of 'zombies' around the world. "Global software companies estimate that more than sixty per cent of all global spam is now relayed via zombies," Maddock said.

The ACMA describes 'zombies' as computers which have been infected by a computer virus or a similar intrusion, including hacking. "Once infected, zombies can be used to commit online crimes remotely from anywhere in the world without the computer owner knowing," the ACMA stated.

"Online crimes include sending spam or hosting offensive material. Owners of the computers may also find themselves paying for bandwidth they did not know they were using."


 
 
 
Top Stories
Windows 10 lands in Australia
Campaign to get business to upgrade kicks off.
 
NSW to build its own myGov
Service NSW digital profiles available by September.
 
Android bug leaves a billion phones open to attack
Hackers only need phone number to target devices.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
The 5 Windows 10 privacy issues you should be aware of
Jul 31, 2015
There are a few unsettling details when it comes to Windows 10 privacy
Windows 10 is here! (For some)
Jul 29, 2015
Delivery of the free upgrade versions of Windows 10 began today - have you got yours yet?
Microsoft reveals Microsoft Send, a new enterprise chat app to rival Slack
Jul 27, 2015
Microsoft Send is MSN Messenger for grownups, and you could be using it at work very soon
Developers offered $500,000 grants to find HoloLens uses
Jul 8, 2015
Can augmented-reality end up in business?
Microsoft Tossup: The planning app for unorganised groups of friends
Jul 8, 2015
App allows friends to research venues, vote on plans and chat. And depending on how you run your ...
Latest Comments
Polls
Should law enforcement be able to buy and use exploits?



   |   View results
Yes
  14%
 
No
  51%
 
Only in special circumstances
  17%
 
Yes, but with more transparency
  18%
TOTAL VOTES: 773

Vote