Posts tagged ‘trojan’

Here’s an article on Mobile Redirect with an interesting twist on the recent worm.

This is an amazing by-product of social networks. The ability for users to identify and kill viruses, worms, trojan horses, etc. These types of unique social network ecosystems reflect activity existant in the natural world.


“Social networks have built-in antibodies…their users,” said Sean Sullivan of the Finnish security company F-Secure. “Compare the Twitter attack to a malicious attack of yesteryear that took weeks or even months to develop. This peaked and ebbed in two and a half hours,” Sullivan said.

That’s not to say that spammers don’t love sites like Twitter, because all they care about is finding some sucker to buy their product. A two-hour flood of spams is “great”, as far as they are concerned. But, it’s an interesting concept regarding worms and other malware on such sites.

Thoughts?  Comments?  Leave them in the comment area below.  Thanks.

Is this the first case of computer malware causing human deaths? Perhaps. But it certainly won’t be the last.

As noted in a recent MSNBC article:

Authorities investigating the 2008 crash of Spanair flight 5022 have discovered a central computer system used to monitor technical problems in the aircraft was infected with malware.

An internal report issued by the airline revealed the infected computer failed to detect three technical problems with the aircraft, which if detected, may have prevented the plane from taking off, according to reports in the Spanish newspaper, El Pais.

Flight 5022 crashed just after takeoff from Madrid-Barajas International Airport two years ago today, killing 154 and leaving only 18 survivors.

Windows uses what is known as “file extensions” (the letters after the ‘.’ in the filename) to determine how to handle the file. For example, “.exe” files are executable programs, “.doc” are documents (typically MS-Word), and “.qbw” are QuickBooks data files.

Out of the box, Windows defaults to hiding the file extension in folder listings, instead relying on the file’s icon to convey the file type to the user. The “bad guys” have taken advantage of this, by making you think the file is of one type, when it’s really an executable program designed to infect your system.

Icon with extensions hiddenIs this “report” a document you can view,
or a trojan designed to infect your system?

Fortunately, it’s an easy fix.

Continue reading ‘Don’t hide file extensions’ »

You’re at a conference for information security.  You pass the IBM booth where they’re giving out free USB thumb drives with some marketing material, and you pick one up.  Think you’re safe?  Think again.

Even IBM can make mistakes.

Continue reading ‘Even IBM can make mistakes’ »