Tuesday, August 14, 2012

Blog as a safe haven for criminals?


Vai to blog or not blog? Well, why not? A lot of people like to either write or read blogs - sometimes both. The much quoted survey by the Pew Internet and American Life Project, 27 per cent say they read blogs. 38 percent of all Internet users at least know what is a blog. The survey was made in November 2004 and has estimated that 32 million Americans to be blog readers by the end of 2004. So now we must be much more blog readers and writers.

But there was bad news recently that bloggers spoiled "state of mind. The security firm Websense has discovered that blogs are" used as a safe haven by hackers for storing and distributing malicious code, including 'identity-stealing keyloggers. "
Since January, Websense Security Labs has discovered hundreds of blogs set by hackers.

There have been dozens of articles on this topic from last week. See, for example, the article by Gregg Keizer, "Hackers are using blogs to spread worms, keyloggers," April 13, 2005 at
http://informationweek.com/story/showArticle.jhtml?articleID=160702505

The general idea of ​​all these articles is the same: Hackers turn to blogs. Blogs are suitable for them: there are large amounts of free space, without authentication of identity is required to send, and no scanning of uploaded files for viruses, worms, spyware, or in most blog hosting services.

These experts at Websense Security Labs blog called "toxic". In its press release "Blogs toxic distribute malware and keyloggers" explained how some malicious people use blogs for their own benefit.

In some cases, criminals create a blog on a legitimate site and enter the host viral or keylogging software to the page. Then attract traffic to your blog toxic by sending a link through spam or spim (the analog of spam for instant messaging (IM). Thus, there is never a good tip to follow the links to spam it is worth remembering.

In other cases, a blog can only be used as a storage mechanism which keeps malicious code (eg, updates) for Trojan horses that have been hidden on users' computers.

"To read or not read blogs - which is a question?" Of course, to read, write - blogs are just a part of our culture. But beware.

While PC users can do little to remain part of the blog is not toxic except by following the links in spam messages and SPIM, has led to these blogs. If a blog is used as a repository for malicious code, users can do anything about it.

It is for traders blogging tool to add security, such as anti-virus and anti-spyware, a blog hosting service. They may also limit the types of files that can be stored. It is time they made their service more secure, as literally millions of Americans could be in danger to collect malicious code, like a horse viruses, worms or Trojan simply by reading a blog .......

No comments:

Post a Comment