To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers.
But there has recently been bad news that spoiled bloggers' mood. The security firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, including identity-stealing keyloggers." Since January, Websense Security Labs has discovered hundreds of blogs set by hackers.
There have been scores of articles on this topic since last week. See, for example, the article by Gregg Keizer "Hackers Use Blogs To Spread Worms, Keyloggers" April 13, 2005 at http://informationweek.com/story/showArticle.jhtml?articleID=160702505
The general idea of all these articles is the same: hackers turn to blogs. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services.
Such blogs experts from Websense Security Labs call "toxic". In its press-release "Toxic Blogs Distribute Malcode and Keyloggers" http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/index.php?Release=05041 2889 they explained how some malevolent individuals use blogs for their own gain.
In some cases cybercriminals create a blog on a legitimate host site and post viral code or keylogging software at the page. Then they attract traffic to the toxic blog by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering.
In other cases, a blog can be used only as a storage mechanism which keeps malicious code (for example, updates) for Trojan horses that have already been hidden on the users' computers.
"To read or not to read blogs -- that's a question?" Of course to read them, to write them -- blogs are already a part of our culture. But be careful.
While PC users can do little to stay aside of toxic blogs except not following links in spam and spim messages, leading to these blogs. If a blog is used as a storage for malicious code, users can do nothing at all about it.
It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their service more secure, because literally millions of Americans might be in danger of picking malicious code, such as a virus, worm or Trojan horse, simply by reading a blog.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing which created a technology capable of disabling the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a solution against information-stealing programs and modules.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
History and BackgroundThe virus was one of the first ever... Read More
Be careful of sites that promise to send you "instant... Read More
We all get the odd virus now and then, but... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Spyware is the most troublesome software to appear on the... Read More
A few nights ago I received an email from "2CO"... Read More
There are ways to insure security though. You can get... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Over the past few years as the internet has become... Read More
The words Corporate Security may conjure up images of a... Read More
You'd better learn news from media, not from emails, security... Read More
Spyware and adware are becoming major problems for online surfers... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
Business on the internet is getting down right shameless. This... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
There are folks out there who use their powers for... Read More
You've seen it in the news - 40 million credit... Read More
Ebay is a great site and is used by many... Read More
Let us take the example of scrambling an egg. First,... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
If you know what is the 'Fishing' then it's very... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
This is the second in a series of articles highlighting... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Many of us have run into an annoying and time-consuming... Read More
It's late. You've been scouring the web for that perfect... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
In today's times spyware is a very serious issue and... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
If you have used a Windows machine for a while,... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
There is no doubt that "how-to articles" have become a... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
The trash folder in my main inbox hit 4000 today.... Read More
You'd better learn news from media, not from emails, security... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
We all get the odd virus now and then, but... Read More
Credit card fraud is a growing problem for online businesses... Read More
Every now and then you can read about a new... Read More
First the basic definition of Spyware: It is a type... Read More
This is the second in a series of articles highlighting... Read More
Watching how the traditional media covers the latest virus or... Read More
Imagine my surprise when I received a phone call from... Read More
We all know that it's dangerous to use the same... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
If spyware were a person and he set himself up... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Identity theft rates one of the fastest growing crimes in... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Computer infections can be broken up into 4 main categories... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
Huge number of spyware software applications are available in the... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Paypal is a great site and is used by many... Read More
You've seen it in the news - 40 million credit... Read More
Internet Security |