Rogue LinkedIn Profiles Lead To Malware

Tuesday, January 6th, 2009

LinkedIn is a popular social networking site where you can manage business contacts online. Since you can set up a profile with links to your own website, it seems to attract criminals’ attention as well. A Google search reveals that several hundred fake LinkedIn profiles from nude “Kirsten Dunst” to ...

Twitter Security Collapses

Monday, January 5th, 2009

Days after a wave of phishing attacks fooled thousands of Twitter users, it appears that another security hole has been found by...someone. Obama's account, unused since election day, sent out an affiliate link to a survey with a gas card prize, Fox News said that "Bill O'Reily is gay" (not ...

Altruistic Trojan blocks Piratebay and Mininova access

Monday, January 5th, 2009

A new trojan once again underscores the importance of exercising caution when downloading. Disguised as a keygen, Troj/Qhost-AC is one of the strangest pieces of malware I've seen. The trojan doesn't appear to be particularly malicious. Its mission: to prevent you from downloading torrents from PirateBay and Mininova, keep you from ...

Obfuscation: The Art of Creating Undetectable Malware

Monday, January 5th, 2009

Do not expect that your system would start misbehaving once it is infected by a malware. Malwares can perform their functions without showing any symptoms for days, months or years. New malwares are capable of hiding themselves even from powerful Antivirus scan engines. They can also perform their jobs without affecting ...

Google’s Browser Security Handbook

Sunday, January 4th, 2009

This document is meant to provide web application developers, browser engineers, and information security researchers with a one-stop reference to key security properties of contemporary web browsers. Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities. Although all browsers ...