tag

Google

Malware De-Cloaked

… people have been asking me about Google’s interesting paper on Trends in Circumventing Web-Malware Detection…

The Price of Fame

…there are (over) 2,095,006,005 Internet users nowadays (due credit to www.internetworldstats.com). Inevitably, some of them are going to have the same name as real celebrities and fictional characters…

Cycbot: Ready to Ride

Although the “Ready to Ride” group originated in Russia it distributes Win32/Cycbot outside the borders of the Russian Federation. Going by the prices per installation the primary target of the group is the US.

Anti-Phishing Day

Too bad it doesn’t exist. I mean really exist. Here is how an anti-phishing day that is designed to be a highly effective educational deterrent to phishing would work. Google, Facebook, Hotmail, Yahoo, Twitter, Myspace, Banks, Online Gaming sites, such as World of WarCraft, and others would all send phishing emails to their users. Yes,

Seguridad por casualidad: Google no funcionará en navegadores desactualizados

El día de hoy, Google anunció en su blog para Latinoamérica, que Google Apps comenzará un nuevo plan para soportar solo navegadores modernos. Teniendo en cuenta la cantidad de ataques que aprovechan vulnerabilidades de software en los navegadores, se trata de una interesante iniciativa de seguridad. ¿Así es? Veamos, este es el anuncio específico de

Gmail Accounts Under Attack

Google posted information today about an attack against some Gmail account holders. In this case the attack appeared to be directed at government officials in the US and Korea, as well as Chinese political activists, journalists and military personnel. If you don’t fit in these categories it doesn’t mean you are not at risk, it

Calling Android Smartphone Zombies

Android Smartphones are under attack again by rogue applications that once installed are reading information from the phone and sending it back to a pre-assigned location. According to mobile security firm as many as 120,000 users may have been infected from a cafeteria selection of at least two dozen applications from the Android Market. “Once

Protecting Consumers from Rogue Online Pharmacies

Over the past couple of years rogue online pharmacies have been advertising their domains on search engines and promoting themselves through search engine optimization.  Legitimate pharmaceutical companies have their own measures in place to work on taking these sites offline.  The problem with rogue online pharmacies is that they do not meet federal regulations.  To

Android’s Anomaly?

There are reports coming out today about Google Android and how approximately 99.7% of its users are potentially open to compromise.  This news cycle started by the Ulm University publishing some information on the 13th of May showing some results.  I'm sure this story will develop and CTAC may follow-up to my blog with more details;

Disaster Scams and Resources

I've added some commentary and resources on the Japan earthquake/tsunami disasters to an independent blog I maintain that specializes in hoaxes, scams and so forth, but here are a few of the same resources that aren't already included in my recent blogs here on the topic: Analysis from Kimberley at stopmalvertising.com: http://stopmalvertising.com/blackhat-seo/recent-japanese-earthquake-search-results-lead-to-fakeav.html Guy Bruneau at Internet

Resumen de amenazas de enero

Escuchá el resumen mensual de amenazas en formato podcast: [audio:http://www.eset-la.com/centro-amenazas/podcast/201101-podcast-eset-rma.mp3|titles=Podcast RMA – enero de 2011 – ESET] Nuevamente compartimos con ustedes el resumen mensual de amenazas más importantes del mes de enero. En estos días, pudimos comprobar nuevamente que las redes sociales son un blanco muy importante a la hora de distribuir malware. En este

Piedra libre a Koobface

Este último viernes hemos visto un nuevo golpe a las botnet, en este caso se han dado de baja algunos de los centros de comando de Koobface, una reconocida botnet que ha estado en el ambiente desde hace ya algunos años y le ha dado a sus administradores grandes sumas de dinero en ganancias. Estamos

You’re So Vain…

You might recall back in November of 2009 ESET released the findings of a survey about cybercrime http://www.eset.com/threat-center/blog/2009/11/16/once-upon-a-cybercrime%E2%80%A6. We went back to Competitive Edge Research & Communication and commissioned them to conduct a new survey to determine prevalence of social networking as well as to identify online security and privacy concerns of Americans. In addition

Consecuencias de la Operación Aurora: ¿Google dejará de utilizar Microsoft?

Durante el día de ayer cientos de sitios web y redes sociales publicaron y comentaron una noticia que involucra a dos de las empresas tecnológicas más importantes del mundo: Google abandonaría Windows como Sistema Operativo. La noticia original fue la publicada por el Financial Times donde se afirma entre otras cosas (y en traducción libre):

McAfee FP news misused for more SEO poisoning

We're now seeing a fiercely concentrated Blackhat SEO campaigns exploiting the McAfee False Positive (FP) problem. Juraj Malcho, our Head of Lab in Bratislava, reports that in a Google search like the one I've screendumped above, he got three malicious hits in the top ten (the same ones captured here: of course, the malicious domain

El 60% del malware por keywords es rogue

Según un estudio realizado por Google, los falsos antivirus son los códigos maliciosos más utilizados en la propagación de malware vía Web, específicamente a través de publicidades. Los rogue son falsas aplicaciones antivirus (o de seguridad) que, por lo general, muestran en pantalla al usuario advertencias y falsas alertas llamativas respecto a la existencia de

Google: Single Sign-On, Single Point of Failure?

Spoof or SPOF? IT Security reportage veteran John Markoff reports in the New York Times that the attack on Google's intellectual property reported in January was even more interesting (and disquieting) than most of us realized. According to an unnamed source, some of the information stolen related to the company's password system, Gaia. Gaia is a

Top Four Privacy Hacks/Tips/Trends Of The Week

Clearly, anything which is posted online should be assumed to be eternal, written in stone tablets, and admissible for all time. For the early adopter (Internet, blogger, Friendster, etc.) this also operates as a reminder of the ever-powerful TOS change: just because the terms of service (TOS) say that your content is private now never

Polish Air Accident and Blackhat SEO

Thanks to Marcin Gajewski for pointing out that Lech Kaczynski was the President of Poland, not the Prime Minister. I really shouldn't try to blog after a full day's travelling :( While I was enjoying a rare few days off, my colleagues at ESET Latin America were posting a blog article about the ugly way in

Follow us

Copyright © 2017 ESET, All Rights Reserved.