To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers.
But there has recently been bad news that spoiled bloggers' mood. The security firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, including identity-stealing keyloggers." Since January, Websense Security Labs has discovered hundreds of blogs set by hackers.
There have been scores of articles on this topic since last week. See, for example, the article by Gregg Keizer "Hackers Use Blogs To Spread Worms, Keyloggers" April 13, 2005 at http://informationweek.com/story/showArticle.jhtml?articleID=160702505
The general idea of all these articles is the same: hackers turn to blogs. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services.
Such blogs experts from Websense Security Labs call "toxic". In its press-release "Toxic Blogs Distribute Malcode and Keyloggers" http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/index.php?Release=05041 2889 they explained how some malevolent individuals use blogs for their own gain.
In some cases cybercriminals create a blog on a legitimate host site and post viral code or keylogging software at the page. Then they attract traffic to the toxic blog by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering.
In other cases, a blog can be used only as a storage mechanism which keeps malicious code (for example, updates) for Trojan horses that have already been hidden on the users' computers.
"To read or not to read blogs -- that's a question?" Of course to read them, to write them -- blogs are already a part of our culture. But be careful.
While PC users can do little to stay aside of toxic blogs except not following links in spam and spim messages, leading to these blogs. If a blog is used as a storage for malicious code, users can do nothing at all about it.
It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their service more secure, because literally millions of Americans might be in danger of picking malicious code, such as a virus, worm or Trojan horse, simply by reading a blog.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing which created a technology capable of disabling the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a solution against information-stealing programs and modules.
Learn more -- visit the company's website http://www.anti-keyloggers.com
Shopping for horse gifts or other gift items on the... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Computer infections can be broken up into 4 main categories... Read More
Recently I have received email from my bank/credit Card Company,... Read More
There you are busily typing away on your PC or... Read More
The Threat10 years ago you could probably have run no... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
They're out there. Individuals trying to make a quick buck... Read More
We all get the odd virus now and then, but... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
First, let's do a little recap'. As I stated in... Read More
As soon as almost all computer users already got used... Read More
There are folks out there who use their powers for... Read More
I am the victim of an internet scam. It is... Read More
Huge number of spyware software applications are available in the... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Nowadays more and more people are using a computer. A... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
By browsing a web page, you could infect your computer... Read More
The Internet is a vast International Network of people and... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Let us take the example of scrambling an egg. First,... Read More
In a word, no - an email message has always... Read More
File sharing on p2p is soaring despite the music and... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
There has not been a time in the history of... Read More
Is your data secure? Think again. Securing data is unlike... Read More
You'd better learn news from media, not from emails, security... Read More
Security leaks can be a big problem for any site... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Recently I have received email from my bank/credit Card Company,... Read More
Have been an Internet user for more than 9 years,... Read More
As you know, this time the virus under the name... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
A friend called me one day and asked if I... Read More
Before we start, I want to make it clear that... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Spyware is software that runs on a personal computer without... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Business on the internet is getting down right shameless. This... Read More
First the basic definition of Spyware: It is a type... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
If spyware were a person and he set himself up... Read More
With the Internet entering our lives in such an explosive... Read More
Did you know...? 1 in 5 children who use computer... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
In recent days, I was one of the unfortunate persons... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
A couple of years back, I paid my dues the... Read More
There are ways to insure security though. You can get... Read More
Ebay is a great site and is used by many... Read More
My first experience with a spyware BHO based infection was... Read More
Nowadays more and more people are using a computer. A... Read More
The Federal Bureau of Investigation has identified "phishing" as the... Read More
If you are a parent, you have probably wondered at... Read More
A couple of days ago, I was searching for a... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
This is the second in a series of articles highlighting... Read More
Today,on most internet user's computers, we have the ability to... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
As more people are logging onto the Internet everyday, Network... Read More
Internet Security |