Researchers at security software maker Exploit Prevention Labs have uncovered evidence that malware distributors are using Google AdWords to infect computers.
All Posts Tagged Tag: ‘malware’
Easter is coming up, and of course that means spammers are taking advantage. They do this with most holidays. And like they do with other holidays, they are using the holiday to disguise malicious emails. Symantec shared some examples with us.
"MessageLabs Intelligence has intercepted Easter ‘e-card’ spam emails offering a ‘2010 Easter 3D e-Card,’" a representative for Symantec tells WebProNews. "Spam authors are attempting to use the recent surge of interest in 3D media to increase the likelihood of people falling for their scam."
Google said it has detected malware targeting Vietnamese-language users opposed to bauxite mining in the Communist country.
The malware infected the computers of "potentially tens of thousands of users" who downloaded Vietnamese keyboard language software, Google Security Team member Neel Mehta wrote on the company’s security blog. The attacks targeted opposition to the mining of bauxite, an ore used to make aluminum.
Symantec has released two new reports for the month of November – the State of Spam, and the State of Phishing (both PDFs). The reports highlight a dramatic increase in spam that contains malware. On top of that, junk and malicious email now accounts for close to 9 out of 10 email messages.
You have probably heard about the Indonesian Earthquake that took place last night, claiming the lives of many. Shameless cybercriminals have not wasted anytime exploiting the disaster targeting people around the world who search for information on the subject.
Microsoft has launched a new free anti-malware tool called Microsoft Security Essentials. The service is designed to protect consumers from viruses, spyware, and other malicious software.
The service has two very strong elements going for it. For one, it is from Microsoft, which means it comes from a well-known brand that practically all consumers are familiar with. Secondly, it’s free, and that is another word that resonates with consumers.
There is an online banking Trojan out there that is bypassing up-to-date anti-virus programs as much as 77% of the time, according to security company Trusteer. The Zeus Trojan is also known as Zbot, WSNPOEM, NTOS and PRG. It is the most prevalent financial malware on the web, Trusteer says.
Google is sharing some interesting statistics on malware, such as the number of entries on the Google Safe Browsing Malware List that have occurred over the last twelve months, and search results containing a URL labeled as harmful.
"We’re glad to share this sort of data because we believe that collaboration and information sharing are crucial in driving anti-malware efforts forward," says Niels Provos of Google’s Security Team.
BPM Forum and AVG Technologies released some interesting findings from the Protect the Press Poll, a survey of the cyber security habits of the working press. The biggest takeaway is that the supposedly well-informed members of the press are no better at protecting themselves online than the average user.
Whether you think about it or not, the issue of safety probably affects just about every decision-making process. After all, even if you favor a grocery store based on its low prices and convenient location, you must also on some level recognize that muggings don’t occur there every day. And Microsoft wants to make sure you feel safe using Bing, too.
PandaLabs has identified thousands of links designed to target searchers looking for information on recently popular targets. With the goal of infecting unsuspecting victims with scareware, Twitter recently has also been bombarded with trending spam.
Blackhat SEOs targeting Google search results came to light this spring to redirect trusting users to scareware sites—sites falsely warning targets of viruses on their machine, offering fake system scans, promoting expensive fake anti-virus programs, and installing Trojans.
Gotta hand it to the Web bandits. Buying AdWords is a brazen new realm for them. A paid link leading to a dangerous malware-laden download targeted President-Elect Obama’s sweeping victory.
The ad, which according to the screenshot at security company Sophos blog achieved top placement for the keyword phrase “Obama win,” clicked out to a “rogue” site and a download prompt for an installer that is “100% checked by Antivirus.”
Be careful with Google conspiracy accusations; Matt Cutts might make an example of you. After being accused of blocking anti-Net Neutrality pages on the Progress and Freedom Foundation site, Cutts gloats over data to the contrary on his blog.
Brett Glass, via Dan Farber’s Interesting People mailing list, discovered only pages on PFF.org’s website pertaining to Network Neutrality were flagged by Google as hosting malware. Once flagged, Google gandalfs the old "you shall not pass" command, barring searchers from accessing the infected page via search results.
Webmasters this week were greeted with an "oops, not working" error when they tried using Google’s Malware Review form.
The form that was introduced last year in August to help webmasters solve issues of malware or badware, faced some technical problems this week and this was first reported at around 1 am on May 15th.
Last Tuesday, Google published a report stating that web browsing and searching are increasingly becoming risky. Google for a year and a half now has been identifying web pages that infect vulnerable hosts via drive-by downloads, i.e. web pages that attempt to exploit their visitors by installing and running malware automatically.
A new study by Google that examined 4.5 million Web sites for malicious software found that about one in ten sites were infected.
The study called "Ghost in the Browser" revealed that out of the 4.5 million Web sites analyzed 450,000 had caused Google’s test computer to make a "drive-by download".
The study found that the average user does not have a way to protect themselves from the threat.
About a month ago, Google Image Search started displaying its results a little differently; the makeover yielded a cleaner, but less informative, look. There was a low-level outcry from users, and now things are back to the way they were. That’s all good and well, and an important feature seems to have made it through the shuffle intact.
Google is integrating malware warnings in the search results to warn searchers about risky sites before they go there. In fact, searchers have to work extra hard to get to them.
Results for the phrase "beautiful free screensaver" include a warning with the top result, linking to EliteSavers.com, reading "This site may harm your computer."
RFID tags may become commonplace in the future, but not a lot of people are looking forward to widespread implementation. There was already concern that these “smart barcodes” would allow consumers’ habits to be more easily tracked, and that the technology could facilitate identity theft. It turns out that RFID tags can transmit computer viruses, as well.
It seems that no sooner do you feel safe turning on your computer than you hear on the news about a new kind of internet security threat. Usually, the security threat is some kind of malware (though the term “security threat” no doubt sells more newspapers).
One of the bigger complaints about Google’s search ability is the amount of sites containing various amounts of malware or spyware or viruses still tend to permeate Google’s search results. Many a horror story has been told about a users getting some type of computer infection from a site they’ve discovered on Google (or any search engine for that matter).
In confronting malware, there is nothing innovative about the new strains of Klez, Yaha, SirCam and Code Red. Yet all of these worms have demonstrated unprecedented staying power on the Internet despite the existence of patches, anti-virus signatures, personal firewall protection and Intrusion Detection technology. Why are these threats so prolific, and why do new threats gain traction so quickly if all they amount to are retread malicious code?
This paper analyzes the patterns of emerging malware and presents a strategy to assist network and security administrators in addressing “new” yet old threats.