All TechBlog Health Electronics Cozy Corner

Index of /images: a hiding place for malware?

Author: Omid Farhang Published: March 22, 2010 Reading Time: 4 min

The underlying structure of a typical website is made up of different folders and sub-folders, much like the ones that are on your computer. A webmaster (is this term still used often lol?) transfers files back and forth using an FTP client in order to update the website. In most cases, specific folders are created for a specific reason. For instance the ‘pub’ folder is usually a public repository that allows anybody access to. ...

Continue Reading Index of /images: a hiding place for malware?

Please give me your credit card

Author: Omid Farhang Published: March 22, 2010 Reading Time: 2 min

I won’t abuse it, I promise…. cross my heart… spit into the wind… etc. Hi folks, Yesterday, I received this SPIM (Instant message spam) … usnews3.com sounds kind of official, doesn’t it? and the page looks impressive… There are lots of links on the page, but unfortunately, a mouse-over of each link reveals that they all go to the same place… That’s not a good sign for a legitimate webpage. Moreover, a whois shows that it was registered just on 7th December 2009, and that the ownership is hidden behind a privacy protector service. ...

Continue Reading Please give me your credit card

Screenshots of the latest Twitter phishing attack

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

Today there’s a phishing run underway in Twitter, using Direct Messages (“DMs”). These are private one-to-one Tweets inside Twitter. The messages look like these: If you follow the link, you end up to a fake Twitter page: If you mistakenly give out your credentials, the attackers will start sending similar Direct Messages to your contacts, posing as you. The ultimate goal of the attackers is to gain access to a large amount of valid Twitter accounts, then use these account to post Tweets with URLs pointing to malicious websites which will take over users computers when clicked. ...

Continue Reading Screenshots of the latest Twitter phishing attack

Another FakeAV, for Windows 7!

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

With Windows 7 becoming increasingly popular, more and more software companies have begun to upgrade their interface for the latest Microsoft operating system. Manufacturers seem to understand the need for a beautiful user interface for their products. However, not all software behaves as good as it looks. Today, I saw a Fake Antivirus program with a newer, more jazzed up interface, which we detect as Troj/FakeAle-RK. This malware specifically targets users of Windows 7 and appears in the form of a pop-up dialogue box, which attempts to tell you that your Windows 7 PC has many serious threats. When a user clicks “Remove all Threats immediately”, another pop-up will be generated asking them to download a file called win_protection_update.exe. ...

Continue Reading Another FakeAV, for Windows 7!

The Dangers Of Freebies

Author: Omid Farhang Published: March 19, 2010 Reading Time: 3 min

The internet is rife with free tools from anything to everything (almost) – from free HTML web editors to free applications to free games and so on. We’ve been in this situation before. Sometimes out of curiosity or “affluenza” (also known as “I-GOTTA-HAVE-IT-NOW-NO-MATTER-WHAT”), we are tempted to install some of these free tools and applications from the web. The unfortunate problem with freebies is that unless you know the source of where you download the tools from and whether the software author who created the application is credible, you are literally at the whim and mercy of the author should you choose to download and install the application. ...

Continue Reading The Dangers Of Freebies

Google Code turns five

Author: Omid Farhang Published: March 19, 2010 Reading Time: 1 min

At age five most kids can hop, skip and tie their shoes without help. Google Code turns five this week, and while they’re still working on the shoelaces thing, they’ve grown from a simple site for hosting a couple of APIs into a destination for developers to prototype their ideas in a Code Playground, host all kinds of open source projects and find out about our growing family of APIs and products like App Engine, Google Web Toolkit and Android. ...

Continue Reading Google Code turns five

Fraud alert: Tax time in the USA

Author: Omid Farhang Published: March 19, 2010 Reading Time: 1 min

Benjamin Franklin once wrote, “‘In this world nothing can be said to be certain, except death and taxes.” These days we can add to the certainty of those two inevitable events with the addition of the annual scams that accompany tax time. For those of you who haven’t heard of this type of scam, it’s basically another way to separate a man from his money, or if you want to look at the bigger picture, a way to defraud the federal government. Either way, your wallet suffers. The financial website money-zine has a good article on the latest tax scams you may encounter on the Web. ...

Continue Reading Fraud alert: Tax time in the USA

Twitter launches shortening service

Author: Omid Farhang Published: March 19, 2010 Reading Time: 2 min

Del Harvey, Director of Twitter’s Trust and Safety team, announced on Twitter’s blog that the micro-blogging service has begun using its own shortening service to stop malicious operators from sending tweets with links to their dodgy sites disguised through shortening. He wrote: “By routing all links submitted to Twitter through this new service, we can detect, intercept, and prevent the spread of bad links across all of Twitter. Even if a bad link is already sent out in an email notification and somebody clicks on it, we’ll be able keep that user safe.” ...

Continue Reading Twitter launches shortening service

Can spam get worse?

Author: Omid Farhang Published: March 19, 2010 Reading Time: 1 min

Or is it at the saturation point? The SANS Institute (acronym = SysAdmin, Audit, Network, Security) web site carried a blog piece that gives a good snapshot of the horrible ongoing plague of spam email that IT folks all over the globe must deal with. The writer, Deborah Hale, said the ISP in the Midwest where she works received almost 20 million pieces of email for more than 9,000 accounts since the beginning of March. Only 713,222 (3.6 percent) were NOT spam. ...

Continue Reading Can spam get worse?

Looking for a good time? New scheduling tool in Calendar

Author: Omid Farhang Published: March 19, 2010 Reading Time: 2 min

Scheduling meetings is tough, but rescheduling is even harder. We all know how frustrating it can be to try to find just the right time that accommodates everyone’s availability and preferred working hours. Throw in different time zones and conference rooms and it goes from painful to excruciating. We’d rather schedule dental appointments. On the Google Calendar team, they’ve noticed that when people talk about scheduling they say things like “I’m trying to find a time” or “let’s search for a new date.” They wondered what would happen if they treated calendaring more like a search problem. Just as Google search applies ranking algorithms to return the most relevant results from the web, they hoped they could rank meeting times based on criteria important to the person scheduling the meeting. ...

Continue Reading Looking for a good time? New scheduling tool in Calendar