To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers.
But there has recently been bad news that spoiled bloggers' mood. The security firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, including identity-stealing keyloggers." Since January, Websense Security Labs has discovered hundreds of blogs set by hackers.
There have been scores of articles on this topic since last week. See, for example, the article by Gregg Keizer "Hackers Use Blogs To Spread Worms, Keyloggers" April 13, 2005 at http://informationweek.com/story/showArticle.jhtml?articleID=160702505
The general idea of all these articles is the same: hackers turn to blogs. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services.
Such blogs experts from Websense Security Labs call "toxic". In its press-release "Toxic Blogs Distribute Malcode and Keyloggers" http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/index.php?Release=05041 2889 they explained how some malevolent individuals use blogs for their own gain.
In some cases cybercriminals create a blog on a legitimate host site and post viral code or keylogging software at the page. Then they attract traffic to the toxic blog by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering.
In other cases, a blog can be used only as a storage mechanism which keeps malicious code (for example, updates) for Trojan horses that have already been hidden on the users' computers.
"To read or not to read blogs -- that's a question?" Of course to read them, to write them -- blogs are already a part of our culture. But be careful.
While PC users can do little to stay aside of toxic blogs except not following links in spam and spim messages, leading to these blogs. If a blog is used as a storage for malicious code, users can do nothing at all about it.
It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their service more secure, because literally millions of Americans might be in danger of picking malicious code, such as a virus, worm or Trojan horse, simply by reading a blog.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing which created a technology capable of disabling the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a solution against information-stealing programs and modules.
Learn more -- visit the company's website http://www.anti-keyloggers.com
Nowadays more and more people are using a computer. A... Read More
A new variation of the Nigerian Scam theme ... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
In recent days, I was one of the unfortunate persons... Read More
When we think of adware, what comes to mind are... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Internet scams and frauds are on the rise! The quantity... Read More
The words Corporate Security may conjure up images of a... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
If you have used a Windows machine for a while,... Read More
You are at your computer, checking out software on EBay.... Read More
History and BackgroundThe virus was one of the first ever... Read More
You may not realize it, but as you are surfing... Read More
Today the internet is a mine field of malicious code... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
If you are a parent, you have probably wondered at... Read More
Ebay is a great site and is used by many... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
A few nights ago I received an email from "2CO"... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
This is not some new fangled techno-speak, it is a... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
In 1997, I decided after 15 years as a practicing... Read More
Have you ever got an email asking you to confirm... Read More
Someone recently told me, "You would have to be a... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
A couple of days ago, I was searching for a... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
My first experience with a spyware BHO based infection was... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
You've seen it in the news - 40 million credit... Read More
File sharing on p2p is soaring despite the music and... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
There are folks out there who use their powers for... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Someone recently told me, "You would have to be a... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Security leaks can be a big problem for any site... Read More
You are at your computer, checking out software on EBay.... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
I got a virus the other day, Thursday I believe... Read More
While clicking from site to site on the internet you... Read More
Nowadays more and more people are using a computer. A... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
As you know, this time the virus under the name... Read More
A friend called me one day and asked if I... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
The first thing people think about when defending their computers... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
You'd better learn news from media, not from emails, security... Read More
Identity theft is one of the most common criminal acts... Read More
The average computer is packed with hidden software that can... Read More
If you run any type of Internet business, Adware and... Read More
First of all we need to get some terms stated.... Read More
Have you ever had to call Symantec or McAfee to... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Internet Security |