To blog or not to blog? Well, why not? Lots of people like either to write or to read blogs -- sometimes both. The much-quoted survey by the Pew Internet & American Life Project, says 27 percent read blogs. 38 percent of all Internet users at least know what a blog is. The survey was made in November 2004 and estimated that 32 million Americans to be blog readers by the end of 2004. So now there must be much more blog readers and writers.
But there has recently been bad news that spoiled bloggers' mood. The security firm Websense found that blogs are "being used as a safe haven by hackers for storing and distributing malicious code, including identity-stealing keyloggers." Since January, Websense Security Labs has discovered hundreds of blogs set by hackers.
There have been scores of articles on this topic since last week. See, for example, the article by Gregg Keizer "Hackers Use Blogs To Spread Worms, Keyloggers" April 13, 2005 at http://informationweek.com/story/showArticle.jhtml?articleID=160702505
The general idea of all these articles is the same: hackers turn to blogs. Blogs are suitable for them: there are large amounts of free storage space, no identity authentication is required to post, and there is no scan of posted files for viruses, worms, or spyware in most blog hosting services.
Such blogs experts from Websense Security Labs call "toxic". In its press-release "Toxic Blogs Distribute Malcode and Keyloggers" http://ww2.websense.com/global/en/PressRoom/PressReleases/PressReleaseDetail/index.php?Release=05041 2889 they explained how some malevolent individuals use blogs for their own gain.
In some cases cybercriminals create a blog on a legitimate host site and post viral code or keylogging software at the page. Then they attract traffic to the toxic blog by sending a link through spam or spim (the analog of spam for instant messaging (IM). So a good advice never follow links in spam is worth remembering.
In other cases, a blog can be used only as a storage mechanism which keeps malicious code (for example, updates) for Trojan horses that have already been hidden on the users' computers.
"To read or not to read blogs -- that's a question?" Of course to read them, to write them -- blogs are already a part of our culture. But be careful.
While PC users can do little to stay aside of toxic blogs except not following links in spam and spim messages, leading to these blogs. If a blog is used as a storage for malicious code, users can do nothing at all about it.
It is up for blogging tool operators to add security, such as anti-virus and anti-spyware protection, to blog hosting service. They can also limit the types of files that can be stored. And it is high time they made their service more secure, because literally millions of Americans might be in danger of picking malicious code, such as a virus, worm or Trojan horse, simply by reading a blog.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing which created a technology capable of disabling the very processes of information capturing -- keylogging, screenshoting, etc. It makes the company's anti-keylogging software a solution against information-stealing programs and modules.
Learn more -- visit the company's website http://www.anti-keyloggers.com
Identity Theft is one of the most serious problems facing... Read More
With the advent of the World Wide Web, a whole... Read More
There you are busily typing away on your PC or... Read More
First off I should explain what phishing is. Phishing is... Read More
Huge number of spyware software applications are available in the... Read More
Ebay is a great site and is used by many... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
There is nothing more important that password security in world... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
There are ways to insure security though. You can get... Read More
Scams involving email continue to plague consumers across America, indeed... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
Have you ever had to call Symantec or McAfee to... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Despite the current wave of identity theft and corporate security... Read More
The most frustrating part of having Spyware on your computer... Read More
A week or so ago, I received an inquiry from... Read More
Have you ever bought a product or service from the... Read More
It's late. You've been scouring the web for that perfect... Read More
If you have used a Windows machine for a while,... Read More
First the basic definition of Spyware: It is a type... Read More
As the number of people using the Internet as an... Read More
In the past I've never really paid much attention to... Read More
As you know, this time the virus under the name... Read More
Credit card fraud is a growing problem for online businesses... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Did you know...? 1 in 5 children who use computer... Read More
P C. owners are constantly at risk from attacks by... Read More
In a word, no - an email message has always... Read More
Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More
So called phishers try to catch the information about the... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
This is the second in a series of articles highlighting... Read More
No longer are viruses the only threat on the internet.... Read More
If you use emails actively in your communication, you must... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Fishing on the Internet has come a long way. However,... Read More
In today's times spyware is a very serious issue and... Read More
Over the past few years as the internet has become... Read More
You may not realize it, but as you are surfing... Read More
Spyware protection software is the easiest way of removing spyware... Read More
As the number of people using the Internet as an... Read More
If you are a parent, as am I, I think... Read More
Well, if that would have been said to me by... Read More
|