tag
Google

Here Come (more of) The Ghouls

[Update: it's likely that the attacks described below will also take advantage of the more recent bombings in Dagestan, as described by the BBC here. Isn't it bad enough that horrors like this take place at all, let alone provide revenue for cybercriminals?] Late last  night (30th March) I added a pointer to my earlier

Russian Metro Bombings: Here come the Ghouls

[Interim updates removed: later information on Twitter profile attacks and Blackhat SEO attacks using keywords related to this topic to spread malware, has been made public in a later blog at http://www.eset.com/blog/2010/03/30/here-come-more-of-the-ghouls.] Following this morning's bombings in the Moscow Metro (subway system), Aryeh Goretsky suggests the likelihood of criminals using "blackhat SEO" (search engine optimization

The Ugly Marketing of Google Security

Engineers are really smart people who often know how to make something with no real world effectiveness work really well without effect. In a glaring example of marketing hype, very limited effectiveness, and a lesson in teaching users to fall for phishing attacks, Pavni Diwanji, Engineering Director at Google published a blog post http://googleonlinesecurity.blogspot.com/2010/03/detecting-suspicious-account-activity.html The

“Londoning”: Mugs and Muggings Revisited

Last summer (June 2009), I posted about an example of a very common scam that relies on the scammer gaining access to someone else's email or Facebook account, then sending messages to all their contacts claiming that they've been mugged while abroad on business or vacation, and need their friends to send them some money

Is Gmail Spyware?

Perhaps you have seen the recent buzz around Google Buzz. The fact is that Google has decided that anything it knows about you it is free to share with the world at its discretion and not only do you not need to be told, but if you say no they will say yes for you.

Google’s Stance on Privacy

Recently Eric Schmidt, the CEO of Google, said in an interview “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place”. There are a variety of circumstances in which a person would want some degree of privacy for perfectly legitimate reasons. If a person

The out-of-control decade

We interrupt our – well, my - scheduled programming to bring to your attention an article in "The Register" that I think deserves your attention. I put up what was intended to be a brief pointer on the AVIEN blog (http://avien.net/blog/?p=253), but I found myself kind of warming to the subject, to the extent that I

Arggghhh Google

So far, Google’s response to my blog has been identical to the response you get from abuse@blogspot.com, except without the delayed and failed delivery notifications. Yes, I actually did get a delayed delivery notification from the email I sent to abuse@blogspot.com, and then later a delivery failure. I suspect that from Google’s perspective there is

Google – The Pirate’s First Mate

When it comes to software piracy, it is hard to find a more complicit, competent, and friendlier ally than Google, assuming you are a pirate. Google owns the popular blogging site “Blogspot.com”. If you want to know how to illegally gain access to software, blogspot is probably one of the premier resources on the internet

TinyURL: the Tiny Terror

The Register today ran a story about the phishing attack spread by the Google Talk instant messaging system, which uses TinyURL to conceal the real name of the link. John Leyden’s story (quoting Graham Cluley at some length) makes several good points about reducing your exposure to the threat, and Graham’s blog makes some more.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2013 ESET, All Rights Reserved.