| 

Google Toolbar tracks searches after itā€™s disabled.

  • Post author: Omid Farhang
  • Post published: January 25, 2010
  • Reading Time: 2 min
  • Word Count: 396 words

Ben Edelman, Harvard privacy researcher and guru has revisited the features of Google Toolbar and was appalled to discover that disabling it doesnā€™t really disable it. He is recommending that all users uninstall it. In a long, thorough and well-written piece on his blog Edelman discusses how he monitored the Toolbarā€™s behavior with a network sniffer and documented the transmission of data back to Google (to toolbarqueries.google.com). Not only does it track a userā€™s Google searches, but it also phones home information about searches done in other search engines. ...

Continue Reading Google Toolbar tracks searches after itā€™s disabled.

Dirty jokes by mobile phone

  • Post author: Omid Farhang
  • Post published: January 22, 2010
  • Reading Time: 2 min
  • Word Count: 261 words

The Danwei web site (Chinese media, advertising, and urban life) is carrying a rippingly funny blog piece by Alice Xin Liu about a recent Chinese government program that would have China Mobile monitor mobile telephone text transmissions for conversations of a sexual nature. Offendersā€™ (messaging) service would be cut off until they wrote a ā€œself-criticism.ā€ Xin Lilu said bloggers in China are having a ball with the idea that the government is trying to censor dirty jokes, which apparently are a significant part of the culture of Chinese people (as if they were any different than the rest of us). ...

Continue Reading Dirty jokes by mobile phone

UK telecom giant Virgin Media monitoring customersā€™ file sharing

  • Post author: Omid Farhang
  • Post published: January 21, 2010
  • Reading Time: 1 min
  • Word Count: 111 words

Virgin Media, the UK telecommunications giant that supplies TV, phone and Internet services, has begun to use deep packet inspection determine if its Internet customers are sharing music or films. The monitoring system will check transmitted data against a database of copyrighted music and video to spot illegal file sharing. Virgin Media said the system isnā€™t keeping track of IP addresses of the transmissions and the technology isnā€™t designed to catch illegal downloaders, but it could. ...

Continue Reading UK telecom giant Virgin Media monitoring customersā€™ file sharing

Report from Europe: 95 percent of email is spam

  • Post author: Omid Farhang
  • Post published: January 21, 2010
  • Reading Time: 1 min
  • Word Count: 108 words

The European Network and Information Security Agency (ENISA) has released a report that says 95 percent of all email is now spam. The report was based on surveying last year of email traffic by about 100 service providers in 30 countries. ENISA Executive Director Dr. Udo Helmbrecht said: ā€œSpam remains an unnecessary, time consuming and costly burden for Europe. Given the number of spam messages observed, I can only conclude more dedicated efforts must be undertaken. _ _ ā€œEmail providers should be better at monitoring spam and identifying the source. Policy-makers and regulatory authorities should clarify the conflicts between spam-filtering, privacy, and obligation to deliver.ā€ ...

Continue Reading Report from Europe: 95 percent of email is spam

Facebook Privacy Doesn't Really Exist

  • Post author: Omid Farhang
  • Post published: January 16, 2010
  • Reading Time: 2 min
  • Word Count: 253 words

Facebook recently rolled out new privacy settings that provides additional publishing controls. For example, Facebook users can now publish a photo to a selected list of friends. Clicking the ā€œlockā€ icon opens the Custom Privacy settings. Once a photo is selected and the privacy options are set, the next step is to Share. As you can see, the default setting is set for Only Friends and this particular post is set for Only Me. ...

Continue Reading Facebook Privacy Doesn't Really Exist

Symantec ā€“ Spam and Phishing Landscape: January 2010

  • Post author: Omid Farhang
  • Post published: January 16, 2010
  • Reading Time: 2 min
  • Word Count: 272 words

Notable highlights this month include the shift of the regions of message origin, and changes in the average size of spam messages. In recent months, APJ and South America have been taking the spam share away from the traditional leaders of North America and EMEA. However, North America and EMEA together sent 57 percent of spam messages in December 2009, compared with 50 percent in November 2009. With respect to the average size of the messages, the 2kb ā€“ 5kb message size category increased by seven percent, while the 5kb ā€“ 10kb message size category decreased by six percent in December 2009. With respect to all spam categories, health and product spam have increased and now account for 52 percent of all spam messages. Click here to download the January 2010 State of Spam Report, which highlights the following trends: ...

Continue Reading Symantec ā€“ Spam and Phishing Landscape: January 2010

New Koobface variant saves researchers time from analysis

  • Post author: Omid Farhang
  • Post published: January 16, 2010
  • Reading Time: 2 min
  • Word Count: 396 words

Researchers at McAfee labs monitor Koobface activities 24/7 via custom honeypots and while reviewing one such update we noticed a variant that had debug/log features. Unlike the traditional captcha breaking technique to create new accounts, this variant of the worm converts the infected machine to a bot. When we analysed the malware trapped in our botnet, we found that this variant of Koobface has a special feature for logging all activities carried out during the infection process in a log file . Log file is created under system root with date and time stamp for eg, C:\fb_reg20090612.log. ...

Continue Reading New Koobface variant saves researchers time from analysis

Seasons of Scams

  • Post author: Omid Farhang
  • Post published: January 16, 2010
  • Reading Time: 2 min
  • Word Count: 266 words

With the holiday season behind us, cyber scammers and spammers will now be looking towards the upcoming events and worldwide happenings that they can leverage to form the next waves of online trickery. The noteworthy ones on the horizon include Valentineā€™s Day, tax-filing season, and the FIFA World Cup ā€“ all of which will, in all likelihood, produce their own variety of social engineering techniques, online fraud, malware, fake websites, phishing, and spam. ...

Continue Reading Seasons of Scams

Consistent Computer Virus Malcode names

  • Post author: Omid Farhang
  • Post published: January 15, 2010
  • Reading Time: 3 min
  • Word Count: 459 words

InfoSecurity, a great site for computer security news, just put up a story asking the very old question: ā€œWhy donā€™t AV vendors name malcode consistently.ā€ The lead on the piece was: ā€œā€¦Fortinet, Sunbelt Software, and Kaspersky all published their lists of the most prevalent malware strains for the last month of 2009, but they didnā€™t match up, leading to an admission that users will inevitably be confused by the results.ā€ Great observation, sort of. ...

Continue Reading Consistent Computer Virus Malcode names

Rimecud and Hamweq ā€“ birds of a feather

  • Post author: Omid Farhang
  • Post published: January 13, 2010
  • Reading Time: 2 min
  • Word Count: 227 words

Following the addition of Win32/Hamweq to the MSRT last month, MMPC will continue cleaning PCs in 2010 by adding another prevalent worm, Win32/Rimecud, to this monthā€™s removal tool. This is due not only to Win32/Rimecudā€™s high detection numbers, which immediately follow those of Win32/Hamweq, but also to the similarities the two families share with each other. In fact, as part of its payload, Win32/Hamweq may download Win32/Rimecud, contributing to Rimecudā€™s suitability as the next target for MSRT. ...

Continue Reading Rimecud and Hamweq ā€“ birds of a feather