One-In-Six Spyware Apps Tries To Steal Identities

Saturday, March 8th, 2008

A significant portion of spyware is designed specifically to steal identities, underscoring the trend toward more malicious use of such software by criminals, said a security firm Wednesday.Fifteen percent of the 2,000 known spyware threats analyzed by Aladdin Knowledge Systems over a two-month span send private information gathered from the ...

Yahoo hosting thousands of phishing sites

Saturday, March 8th, 2008

Yahoo is playing host to thousands of phishing sites and doesn't have sufficiently well-trained staff to address the problem of online fraud, according to a leading anti-spam and security organisation on Tuesday.Richard Cox, chief information officer of Spamhaus, told an audience of politicians, security experts and law enforcement officials that ...

Protect your Web site from Google Hacking

Saturday, March 8th, 2008

What's accessible to the average person about your Web site? It could be more than you bargained for. Even if pages are hidden from view, confidential files about customers and employees could be just a search phrase away. Google.com keeps a massive index of Web pages and files on the Web. ...

Spyware shifts from marketing to robbery

Saturday, March 8th, 2008

Need examples of why spyware is so insidious? Headlines from the last few months are full of them, said Richard Stiennon, VP of threat research for Boulder, Colo.-based security firm Webroot. Spyware probably contributed to the data thievery companies like Lexis-Nexis, BJ's Wholesale Club and Bank of America suffered, he ...

ID Theft Keylogger Examined

Saturday, March 8th, 2008

I have had email conversations with a number of people at Sunbelt Software about the ID theft ring they discovered recently. They were kind enough to provide a HijackThis log entry that identifies the keylogger. I promised not to publish it but said I would warn the helpers at the ...