To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers.
But there has recently been bad news that spoiled bloggers' mood. The security firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, including identity-stealing keyloggers." Since January, Websense Security Labs has discovered hundreds of blogs set by hackers.
There have been scores of articles on this topic since last week. See, for example, the article by Gregg Keizer "Hackers Use Blogs To Spread Worms, Keyloggers" April 13, 2005 at http://informationweek.com/story/showArticle.jhtml?articleID=160702505
The general idea of all these articles is the same: hackers turn to blogs. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services.
Such blogs experts from Websense Security Labs call "toxic". In its press-release "Toxic Blogs Distribute Malcode and Keyloggers" http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/index.php?Release=05041 2889 they explained how some malevolent individuals use blogs for their own gain.
In some cases cybercriminals create a blog on a legitimate host site and post viral code or keylogging software at the page. Then they attract traffic to the toxic blog by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering.
In other cases, a blog can be used only as a storage mechanism which keeps malicious code (for example, updates) for Trojan horses that have already been hidden on the users' computers.
"To read or not to read blogs -- that's a question?" Of course to read them, to write them -- blogs are already a part of our culture. But be careful.
While PC users can do little to stay aside of toxic blogs except not following links in spam and spim messages, leading to these blogs. If a blog is used as a storage for malicious code, users can do nothing at all about it.
It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their service more secure, because literally millions of Americans might be in danger of picking malicious code, such as a virus, worm or Trojan horse, simply by reading a blog.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing which created a technology capable of disabling the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a solution against information-stealing programs and modules.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
The movie Little Black Book features a young woman, Stacy,... Read More
Whether we like it or not, we are all living... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Did you know...? 1 in 5 children who use computer... Read More
By browsing a web page, you could infect your computer... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
The 1998 Data Protection Act was not an extension to,... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
We all know that it's dangerous to use the same... Read More
Working from home has its advantages, including no commute, a... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
If you use the internet, you have probably been infected... Read More
Long gone are the days that we could feel secure... Read More
Phishing is the act of some individual sending an email... Read More
Imagine my surprise when I received a phone call from... Read More
There are several basic concepts to keep in mind when... Read More
Every single time you access a website, you leave tracks.... Read More
In today's times spyware is a very serious issue and... Read More
These six ways to prevent identity theft offer you valuable... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Be careful of sites that promise to send you "instant... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Have you ever bought a product or service from the... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
There are folks out there who use their powers for... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
To blog or not to blog? Well, why not? Lots... Read More
Ok, you've got a computer, and you get online. You... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
What is computer security? Computer security is the process of... Read More
My first experience with a spyware BHO based infection was... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
In the past I've never really paid much attention to... Read More
Ebay is a great site and is used by many... Read More
We all know that it's dangerous to use the same... Read More
The Message Must Get Through The year is 300A.D.,... Read More
Long gone are the days that we could feel secure... Read More
You'd better learn news from media, not from emails, security... Read More
There are several basic concepts to keep in mind when... Read More
So called phishers try to catch the information about the... Read More
In a word, no - an email message has always... Read More
Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Phishing is a relatively new form of online fraud that... Read More
While clicking from site to site on the internet you... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
A friend called me one day and asked if I... Read More
Huge number of spyware software applications are available in the... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
There are ways to insure security though. You can get... Read More
Imagine my surprise when I received a phone call from... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
Well, if that would have been said to me by... Read More
You've seen it in the news - 40 million credit... Read More
Before we start, I want to make it clear that... Read More
Threats we ordinary Web users face online leave us no... Read More
Internet Security |