Symantec blog today on how rogue applications infiltrate user’s machine to earn money.It’s done by rogue apps thru System tray, Active Desktop, Dialogue box. Symantec provided some screenshots including a misleading application with a Windows Vista look. http://www.symantec.com/enterprise/security_response/weblog/2007/10/we_pwn_your_desktop.html
PineApp has released a free zombie test that can instantly discover whether an organization’s computer network might be an unwitting spamming machine — a “zombie” or “bot” — that can send thousands of infected spam messages to other networks—without its knowledge. As a global provider of appliance-based solutions for email and network security, PineApp Corporation (http://www.pineapp.com) has created the free diagnostic tool—Zombie Detection System™ (ZDS™)—to determine if a network is infected. Organizations can simply go to http://www.rbltest.com/, enter the IP address and get an instant analysis. http://www.darkreading.com/document.asp?doc_id=137353
The University of B.C. wants the right to keep using “spyware” to monitor its employees’ Internet use. And the university — which used the software to fire a worker who surfed non-work-related websites for hours a day — has gone to court to challenge an anti-spyware order by B.C.’s privacy commission. Michel Mandono, an engineering technician in UBC’s botany department, was fired in February 2005 for “repeated theft of time” as well as failure to perform his work, excessive lateness, dishonesty and breach of trust. http://www.canada.com/theprovince/news/story.html?id=a7dc308c-65ca-42e2-b3ef-c0a7c67869a4
Spyware is the most rapidly evolving threat on the threat landscape at the moment, and it will continue this way into 2008, said Gerhard Eschelbeck, chief technology officer of Webroot Software, at RSA Europe in London on 23 October. Spyware is software that covertly gathers information through a user’s internet connection without their knowledge for malicious purposes. “It is financially motivated and it takes advantage of human nature,” said Eschelbeck. Spyware steals system resources, shows unwanted advertisements and re-directs users through false search results and other hijacks. http://www.computerweekly.com/Articles/2007/10/25/227721/rsa-2007-spyware-cashes-in-quietly.htm
Less than a year after successfully negotiating a US$1.5 million wrist-slap to to settle charges that it used sneaky tactics to install spyware on millions of computers, DirectRevenue (also known as Best Offers) has shut down operations. The notorious spyware vendor, reviled for shady installation practices, numerous name changes and the aggressive use of annoying pop-ups to serve contextual ads, has posted this note on its home page. Best Offers and Direct Revenue have ceased operations. To service legacy consumers we are maintaining this page of uninstall instructions, an uninstall software tool, and an email based support service. http://blogs.zdnet.com/security/?p=608
In a continuation of the discovery of the RBN’s “Retail Division” one of the most important exploit delivery methods is the fake; anti-spyware and anti-malware for PC hijacking and personal ID theft, this is a source of revenue for the RBN also from a direct sale. More http://rbnexploit.blogspot.com/2007/10/rbn-top-20-fake-anti-spyware-and-anti.html (with screenshots)
Everyone’s favorite love-to-hate spyware company Zango has acquired browser based comparison shopping engine Smart Shopper for what we’ve been told by two people related to the company (but unconfirmed directly) for $9 million. Smart Shopper offers what on the surface appears to be a fairly non-threatening shopping assistant add on for Internet Explorer, however according to a number of sites is really adware that does nothing more than deliver advertisements and is difficult to remove. Zango has a long history in the spyware business, having faced numerous court challenges over its business tactics whilst attempting to get in on the … Continue reading Zango Acquires Smart Shopper For $9 Million: Now More Evil
Spyware – also known as Adware or Parasite. It is in installed in a system to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware is usually bundled in a software that are offered as free program or shareware and website service. Security Issue – A spyware has all privileges of the user who installed it. Spyware cause conflict with an operating system and applications. It can slow down the system. It can delete, read, write, download, install another software, change or edit users’ preferences. Others can even format the hard-drive! The above PC … Continue reading Why do you need anti-spyware software?
I’ve joined Bootcamp and Classroom few weeks ago to learn how to analyze HijackThis logs. It was fun to learn how to use the HijackThis tool. It’s something like “hunting for spywares!”. The HijackThis is available for everyone but there are some stuff that is available only to Bootcamp and Classroom volunteeers. Yes, we’ve seen online tutorials on how to understand and use HijackThis but there are more to know if you will join Bootcamp or Classroom. HijackThis Experts and Teaching Assistants will guide everyone on what are the first and important items to look for while analyzing the Hijack log because not all “bad” … Continue reading Classroom & Bootcamp – HijackThis Logs
Spyware – also known as Adware or Parasite. It is in installed in a system to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware is usually bundled in a software that are offered as free program or shareware and website service . Security Issue – A spyware has all privileges of the user who installed it. It can delete, read, write, download, install another software, change or edit users’ preferences. Others can even format the hard-drive! Prevention: 1. Go to Windows Update website. Make sure that your system is fully patched. Install … Continue reading Rid the spies!