![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Blogs as Safe Haven for Cybercriminals?
To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers. But there has recently been bad news that spoiled bloggers' mood. The security firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, including identity-stealing keyloggers." Since January, Websense Security Labs has discovered hundreds of blogs set by hackers. There have been scores of articles on this topic since last week. See, for example, the article by Gregg Keizer "Hackers Use Blogs To Spread Worms, Keyloggers" April 13, 2005 at http://informationweek.com/story/showArticle.jhtml?articleID=160702505 The general idea of all these articles is the same: hackers turn to blogs. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services. Such blogs experts from Websense Security Labs call "toxic". In its press-release "Toxic Blogs Distribute Malcode and Keyloggers" http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/index.php?Release=050412889 they explained how some malevolent individuals use blogs for their own gain. In some cases cybercriminals create a blog on a legitimate host site and post viral code or keylogging software at the page. Then they attract traffic to the toxic blog by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering. In other cases, a blog can be used only as a storage mechanism which keeps malicious code (for example, updates) for Trojan horses that have already been hidden on the users' computers. "To read or not to read blogs -- that's a question?" Of course to read them, to write them -- blogs are already a part of our culture. But be careful. While PC users can do little to stay aside of toxic blogs except not following links in spam and spim messages, leading to these blogs. If a blog is used as a storage for malicious code, users can do nothing at all about it. It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their service more secure, because literally millions of Americans might be in danger of picking malicious code, such as a virus, worm or Trojan horse, simply by reading a blog. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing which created a technology capable of disabling the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a solution against information-stealing programs and modules. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: PwC China plans to spin off cyber security arm Financial Times Opinion | What Happens When There’s a Real National Security Crisis? The New York Times AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock The Hacker News Trump fires NSC officials a day after far-right activist raises concerns to him about staff loyalty AP News National Security Agency Director Gen. Haugh fired, civilian deputy director reassigned: report Fox News Donald Trump fires director of US National Security Agency and other officials – US politics live The Guardian Trump ousts members of National Security Council staff The Washington Post GitLab: Addressing the Roots of Enterprise Security Issues Cyber Magazine Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware - The Hacker News Trump fires six national security staffers after meeting with far-right activist Laura Loomer The Guardian National Security Agency chief ousted after far-right activist urged his removal The Washington Post KuCoin Achieves SOC 2 Type II Certification: Strengthening Security and Compliance Standards PR Newswire Russia open to security guarantees for Ukraine ‘in some form,’ Putin’s envoy says after White House talks politico.eu Israeli Troops Expand 'Security Zone' in Northern Gaza U.S. News & World Report Too little budget for OT security despite rising threats csoonline.com Trump’s Tariffs Have National Security Implications Too The Cipher Brief IDF, Israel Police ignored all security dangers leading to Nova festival massacre The Jerusalem Post Trump confirms Security Council firings The Arkansas Democrat-Gazette Donald Trump fires National Security Agency director Financial Times Trump fires national security officials after Laura Loomer ‘excoriated’ them in Oval Office meeting AL.com Invi Grid Security Platform Added to Cowbell Rx Marketplace Channel Insider National Security Agency Director Gen. Haugh fired, civilian deputy director reassigned: report FOX 29 Philadelphia NSA and partners Issue Guidance on Fast Flux as a National Security Threat National Security Agency (NSA) (.gov) Homeland Security officer spotted at BU, student groups hold walkout for a sanctuary campus The Daily Free Press Maritime Expeditionary Security Riverine Squadron 11 (MSRON 11 FRWD) Coxswain Pinning Ceremony DVIDS The Failure of Collective Security Hungarian Conservative NSSC Investors Have Opportunity to Join Napco Security Technologies, Inc. Fraud Investigation with the Schall Law Firm Business Wire Commission presents a European internal security strategy European Commission Forward-thinking CISOs are shining a light on shadow IT Help Net Security Resideo Debuts First Alert CX4 Camera Series at ISC West 2025 Security Sales & Integration Net Insight strengthens media facility security and quality with SMPTE RP 2129 implementation and Facility Protect NewscastStudio Trump fires three National Security Council officers after meeting far-right activist Laura Loomer for THI The Economic Times Senate GOP's blueprint for Trump's 'big, beautiful' agenda includes tax cuts, border security and more — here's what's inside New York Post New infosec products of the week: April 4, 2025 Help Net Security Trump Moves to Fire Several National Security Officials Deemed Insufficiently Loyal, AP Sources Say Military.com 39M secrets exposed: GitHub rolls out new security tools Security Affairs Connected cars drive into a cybersecurity crisis Help Net Security Inside the AI-driven threat landscape Help Net Security Benefits from privacy investment are greater than the cost Help Net Security Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Luzerne County holds public demonstration of proposed new security-equipped mail ballot drop box The Sunday Dispatch Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Israeli Opposition MK to Be Questioned Over Alleged Leak of Knesset Security Briefing With Netanyahu Haaretz |
![]() |
![]() |
![]() |
RELATED ARTICLES
Blogs as Safe Haven for Cybercriminals? To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. What is Hacking? Are You a Hacker? WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. HackAttack P C. owners are constantly at risk from attacks by hackers. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. Online Shoppers, Beware of a New Scam Beware of a New Scam Aimed at Bargain-HuntersTrying to buy something cheap is absolutely natural--and online crooks set traps for unwitting bargain-hunters. On April 6 Panda Software warned Internet users of a new particularly brazen scam aimed at stealing confidential information. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. If You Sell Anything Online Your ePockets Are Being Picked You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. Eliminate Adware and Spyware Everyone should eliminate spyware and adware from your hard drive for your computer privacy protection. Spyware and adware programs also slow down the speed of your computer by cluttering your hard drive with annoying programs. Online Cell Phone Scams and Spam They're out there. Individuals trying to make a quick buck at your expense. ![]() |
home | site map |
© 2006 |