![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Blogs as Safe Haven for Cybercriminals?
To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers. But there has recently been bad news that spoiled bloggers' mood. The security firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, including identity-stealing keyloggers." Since January, Websense Security Labs has discovered hundreds of blogs set by hackers. There have been scores of articles on this topic since last week. See, for example, the article by Gregg Keizer "Hackers Use Blogs To Spread Worms, Keyloggers" April 13, 2005 at http://informationweek.com/story/showArticle.jhtml?articleID=160702505 The general idea of all these articles is the same: hackers turn to blogs. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services. Such blogs experts from Websense Security Labs call "toxic". In its press-release "Toxic Blogs Distribute Malcode and Keyloggers" http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/index.php?Release=050412889 they explained how some malevolent individuals use blogs for their own gain. In some cases cybercriminals create a blog on a legitimate host site and post viral code or keylogging software at the page. Then they attract traffic to the toxic blog by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering. In other cases, a blog can be used only as a storage mechanism which keeps malicious code (for example, updates) for Trojan horses that have already been hidden on the users' computers. "To read or not to read blogs -- that's a question?" Of course to read them, to write them -- blogs are already a part of our culture. But be careful. While PC users can do little to stay aside of toxic blogs except not following links in spam and spim messages, leading to these blogs. If a blog is used as a storage for malicious code, users can do nothing at all about it. It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their service more secure, because literally millions of Americans might be in danger of picking malicious code, such as a virus, worm or Trojan horse, simply by reading a blog. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing which created a technology capable of disabling the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a solution against information-stealing programs and modules. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES:
Tallahassee hospital cancels procedures, diverts EMS after IT security issue Tallahassee Democrat Band of Barbers, Judges and Security Guards Uses Soviet-Era Guns to Repel Russian Drones The Wall Street Journal Lax Supreme Court security made leak investigation far more difficult: Report Washington Examiner Electronic pollbook security raises concerns going into 2024 The Associated Press - en Español Electronic pollbook security raises concerns going into 2024 Chattanooga Times Free Press Deputy Secretary Sherman's Meeting with Poland's National ... Department of State Biden Administration Announces Additional Security Assistance for ... Department of Defense CBP proposes efforts to strengthen aviation security | U.S Customs and Border Protection President Biden Announces Appointments to the President’s ... The White House FAA Closes Three U.S. Airports Over National Security Risk Travel Market Report Texas Senate leaders signal intent to spend big on border security The Texas Tribune Security Tight as North Macedonia, Bulgaria Honor National Hero Voice of America - VOA News DREAM THEATER's Concert In Oulu, Finland Canceled For ... BLABBERMOUTH.NET Downtown bars under new security guidelines following fatal ... The Turlock Journal Palestinian leaders ‘rebuff' pressure to resume security coordination The Jerusalem Post Basketball games add extra security after multiple lockdowns in Wake County during the week WRAL News Statement of Homeland Security Secretary Mayorkas on the Family ... Homeland Security Gigamon names Chaim Mazal as CSO Help Net Security Attacks on Electrical Substations Raise Alarm The New York Times Barely Dressed Woman Meanders Through Security At The Miami ... View from the Wing Air Force sees national security threat in Chinese-owned corn mill Successful Farming Letters: Recruiting security volunteers could be quite useful, St. Paul and Minneapolis St. Paul Pioneer Press Memphis Police Chief Trained With Israel Security Forces The Intercept Turkey slams West for security warnings 'harming' tourism The Associated Press - en Español Transportation Security Administration confiscates 8th firearm at Reagan National Airport this year Washington Times Williamsport security guard allegedly chokeholds boy PAHomePage.com Teen arrested on suspicion of killing security guard at party in Muscoy San Bernardino County Sun DHS Announces Process Enhancements for Supporting Labor ... Homeland Security More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense Git patches two critical remote code execution security flaws BleepingComputer Identity Thieves Bypassed Experian Security to View Credit Reports ... Krebs on Security Microsoft ends Windows 7 extended security updates on Tuesday BleepingComputer House Republicans Preparing Broad Inquiry Into F.B.I. and Security Agencies The New York Times |
![]() |
![]() |
![]() |
RELATED ARTICLES
New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites. Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. Is The Internet Over Regulated Today's Internet or World Wide Web is being over regulated.But, are you being taken for a ride, are you lead to believe that Governments World Wide are creating new legislation for your benefit or are there underlying factors that these laws are more beneficial to Governments and big business?First we had the Can-Spam and other laws passed regulating the sending of unsolicited commercial e-mail, that contains false or deceptive subject information, or that is sent from invalid e-mail addresses, but for me, my inbox still seems to always be full of junk mail. Protecting Your Identity On The Internet Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Dialing Up a Scam: Avoiding the Auto-Dialer Virus For many, the daily walk to the mailbox evokes mixed feelings: The glee that your favorite monthly magazine - or a friend's hand-written letter (quite a surprise in the e-mail age) may be waiting is countered by anxiety of how many bills the postman left you.Now, imagine coming across your phone bill, thicker and heavier than normal. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Firewalls: What They Are And Why You MUST Have One! A firewall is a system or gateway that prevents unauthorized access to your computer or private network. It is usually the first line of defense in protecting your private information or data. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Social Engineering: You Have Been A Victim Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. Protection for Your PC - Painless and Free! Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance. ![]() |
home | site map |
© 2006 |