Security informational articles

Blogs as safe haven for cybercriminals? - confidence

 

To blog or not to blog? Well, why not? Lots of ancestors like any to write or to read blogs -- at times both. The much-quoted appraisal by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The analysis was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers.

But there has a short time ago been bad news that stained bloggers' mood. The confidence firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, together with identity-stealing keyloggers. " Since January, Websense Defense Labs has open hundreds of blogs set by hackers.

There have been scores of articles on this topic since last week. See, for example, the condition by Gregg Keizer "Hackers Use Blogs To Allotment Worms, Keyloggers" April 13, 2005 at http://informationweek. com/story/showArticle. jhtml?articleID=160702505

The broad-spectrum idea of all these articles is the same: hackers turn to blogs. Blogs are as it should be for them: there are large amounts of free storeroom space, no individuality substantiation is necessary to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services.

Such blogs experts from Websense Defense Labs call "toxic". In its press-release "Toxic Blogs Allocate Malcode and Keyloggers" http://ww2. websense. com/global/en/PressRoom/PressReleases/PressReleaseDetail/index. php?Release=050412889 they explained how some nasty folks use blogs for their own gain.

In some cases cybercriminals construct a blog on a legitimate host site and post viral code or keylogging software at the page. Then they be a focus for interchange to the toxic blog by carriage a link because of spam or spim (the analog of spam for minute messaging (IM). So a good guidance never adhere to links in spam is worth remembering.

In other cases, a blog can be used only as a cargo space machine which keeps malicious code (for example, updates) for Trojan farm animals that have by now been covert on the users' computers.

"To read or not to read blogs -- that's a question?" Of choice to read them, to write them -- blogs are before now a part of our culture. But be careful.

While PC users can do a small amount to stay aside of toxic blogs aside from not next links in spam and spim messages, foremost to these blogs. If a blog is used as a storage space for malicious code, users can do naught at all about it.

It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their ceremony more secure, since exactly millions of Americans might be in chance of pick malicious code, such as a virus, worm or Trojan horse, cleanly by comprehension a blog.

Alexandra Gamanenko at this time works at Raytown Corporation, LLC -- an autonomous software increasing which formed a knowledge clever of disabling the very processes of in a row capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a elucidation anti information-stealing programs and modules.

Learn more -- visit the company's website http://www. anti-keyloggers. com


MORE RESOURCES:














Ingram Micro Link Helps Partners Close Deals, Build Bench Of Security Talent  CRN: The Biggest Tech News For Partners And The IT Channel









The Case for a National Security Budget  Foreign Affairs Magazine













































































Developed by:
home | site map
goldenarticles.net © 2019