Web Chicanery followed by Earthquake and Tsunami Disaster

Immediately after the massive earthquake and tsunami in Japan, experts noticed many Internet fraudsters exploiting the situation through black hat SEO techniques.

The experts said that the criminals immediately started customizing their malicious websites, including keywords related to tsunami and earthquake, to get on top of the search results using black hat seo methods. It has been found out that they were trying to deploy malware

Continue Reading

Linux Routers Targeted by Tsunami Malware

Ever thought Linux is invulnerable and robust against malware attacks? then its time to rethink. Security researchers at TrendMicro found malware that can exploit routers based on Linux and Unix platforms. The malware, though was said to be predominantly found in Latin America, has possibilities of spreading to other regions.

Potential of the threat
As per the source: the malware code, found to be ELF_TSUNAMI.R, has

Continue Reading

Latest Versions of Chrome and Firefox Released

Google had released latest version for Chrome (9.0.597.107) fixing around 19 bugs on Monday. And within no time Mozilla has also come up with latest version of Firefox (3.6.14).

Interestingly, these were released just before the Pwn2Own hacking contest (to be starting on March 9th). Even in 2010, Google released 4.1.249.1036 version, days before the contest. Apple also had released updates for Safari in 2010 in

Continue Reading

Trends in Identity Theft – 2010

More than 8.1 million adults in U.S. fell victim to the ID theft for the year 2010. Though the number of identity theft instances decreased, the amount lost by the victims rose significantly, as per the 2011 Identity Fraud Theft Report from Javelin Strategy & Research.

New types of consumer frauds have evolved into the market incurring more losses to the victims. The average amount lost

Continue Reading

Microsoft to Fix Autorun Issue for Windows XP

The windows autorun feature has been a cake for the malware and botnet creators, based on which they designed many attacks. Being a main aid to trojans and viruse like Conficker, Taterf, Rimecud, Autorun, etc, the autorun was more seen to be as a vulnerability than a feature.

PCs using Windows XP were the most exploited ones due to the autorun feature. According to Microsoft, Windows

Continue Reading

Top 10 Challenges Faced by IT Managers

When it comes to security issues at organizational level, it is not dealing with malware that comes first but managing employees to use web in secure and efficient way. According to a report from MessageLabs Security Safeguard, the top 10 issues faced by IT managers of American companies are:

  1. Time wasting online: 86% of the IT managers surveyed said that they worry about
Continue Reading

Nasdaq System Faces Malware Attack

The company that owns Nasdaq Stock market, recently informed that a malware attack was identified on its servers. The story was first posted on Wall Street Journal. The Nasdaq trading was not affected as the attackers’ target was information from the boards of directors of publicly traded companies.

Going into the details, few suspicious files were found on the U.S servers by the Nasdaq OMX group

Continue Reading

How to Disable Autorun Feature in Windows PC

Your network might seem well protected with all the security measures you have taken from direct attacks. But a whopping 25 percent of malware today is developed to spread through USB devices. Infection through USB drives spreads undetectable into the network and makes it harder to deal with later.

The autorun feature in Windows will simply make the operating system execute anything it is told to execute by an

Continue Reading

Securing Your PCs from Notorious USB Drives

No amount of precautions and security measures for a network will equal the vulnerability created by a small USB device. You can see all the pain you have taken to make your network secure, crumble in a matter of seconds, due to an issue caused by a USB drive. USB drives are small, handy and convenient but one can’t imagine how notorious they are.

Few instances here will tell

Continue Reading