{"id":219340,"date":"2009-12-22T06:00:00","date_gmt":"2009-12-22T11:00:00","guid":{"rendered":"tag:redtape.msnbc.com:\/\/9b516f9e8b0f87ef9f1002a09c52508d"},"modified":"2009-12-22T06:00:00","modified_gmt":"2009-12-22T11:00:00","slug":"12-things-computer-users-should-fear-in-2010","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/219340","title":{"rendered":"12 things computer users should fear in 2010"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">About once a year, computer security news leaps out of the technology section and onto the front page and the top of network news broadcasts.<span style=\"mso-spacerun: yes\">&#0160; <\/span>This year, the day was April Fools&#39; Day, as the Conficker worm became the latest malicious program with the power to eat the Internet.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Somehow, we soldiered on, most of us without ever having to kick on the emergency power generators or dig into that can of spam in the basement shelter.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">But Conficker, while no dramatic outbreak, was also no laughing matter to the hundreds of thousands of Web users who were infected.<span style=\"mso-spacerun: yes\">&#0160; <\/span>The problem with the hype cycle in computer security news is that it can have an incremental &quot;cry wolf&quot; effect on computer users.<span style=\"mso-spacerun: yes\">&#0160; <\/span>The odds that the Internet will topple over in 2010 are, once again, quite low.<span style=\"mso-spacerun: yes\">&#0160; <\/span>But serious threats abound and bad guys are mostly still outpacing good guys in our virtual world, which will be slightly more dangerous than this year. Here are 12 reasons why: <\/span><\/font><\/span><\/p>\n<p><o:p><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">1. E-mail attachments are back<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">The LoveBug and Melissa virus, which did bring the Web to its knees 10 years ago, both used the simplest of delivery mechanisms &#8212; an e-mail attachment.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Sure enough, that method stopped working after companies banned attachments and users wised up. Attachment viruses nearly dried up.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Then, a new generation of users came online who hadn&#39;t learned the Melissa lesson and older users forgot. So this year, virus writers began dusting off their old methods and &#8212; surprise! &#8212; they worked again.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Next year, be on guard for unexpected attachments,<span style=\"mso-spacerun: yes\">&#0160; <\/span>says Carl Leonard, head of the Websense threat lab.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;Sometimes you think this stuff has gone away and then it comes back,&quot; he said. &quot;We&#39;re definitely seeing an uptick in Trojans that come through e-mail.&quot;<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">2. Anti-virus products less effective<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Old-fashioned virus screening tools now catch only about three out of every four viruses through what&#39;s called &quot;signature-based&quot; detection, says Martin Lee of Symantec.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Basic anti-virus tools scan all programs using a list of known malicious programs, looking for electronic &quot;signatures.&quot;<span style=\"mso-spacerun: yes\">&#0160; <\/span>Virus writers now generate so much malicious software that the good guys just can&#39;t keep up. <span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><img decoding=\"async\" alt=\"Logo_mini\" border=\"0\" class=\"asset asset-image at-xid-6a00d83451b0aa69e20120a76144fb970b \" src=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20120a76144fb970b-800wi\" style=\"FLOAT: left\" title=\"Logo_mini\" \/><\/span><\/font><\/span>To make matters worse, virus writers are employing a technique known as &quot;polymorphism,&quot; so the virus can electronically mutate and evade detection.<span style=\"mso-spacerun: yes\">&#0160; <\/span>That means about 25 percent of viruses can evade detection by scanners. New &quot;heuristic&quot; antivirus software detects malicious programs by watching what they do rather than inspecting what they are, but these products are far from perfect. <o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Making matters worse, viruses are now more stealthy after infections. Once upon a time, an infection was obvious, thanks to a dramatic slowdown in performance or some other obvious symptom.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Not true today.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;It&#39;s become increasingly difficult for people to be aware they&#39;ve become infected,&quot; Lee said. &quot;Often, end users just will not realize something has happened.&quot; <o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">With few guarantees for protection, it&#39;s more important than ever to keep the kids off music piracy sites and for you to avoid other unsavory Web places &#8212; and you know the ones I mean.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">3. Fake anti-virus software<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Knowing that your antivirus product might not be doing the job, you might be tempted to look online for an alternative, or to try one that surprisingly pops up on your desktop. <span style=\"mso-spacerun: yes\">&#0160;<\/span>That\u2019s a bad idea: It&#39;s probably a criminal trying to extort you for money.<span style=\"mso-spacerun: yes\">&#0160; <\/span>The art of selling rogue anti-virus software was perfected in 2009. Leonard says consumers shelled out $150 million for fake antivirus programs last year.<strong style=\"mso-bidi-font-weight: normal\"><o:p><\/o:p><\/strong><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;People are selling malicious software and dressing it up as an antivirus product,&quot; he said.<span style=\"mso-spacerun: yes\">&#0160; <\/span>&quot;It surprises me the volume that they are selling. You would think people have become used to seeing these things.&quot;<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Obviously not. <a href=\"http:\/\/www.ftc.gov\/opa\/2009\/06\/winsoftware.shtm\">The Federal Trade Commission did shut down two rogue sellers last year<\/a>, but not until they allegedly tricked nearly 1 million consumers into downloading their software.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">The technique, which works like a charm, will expand next year.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">4. Social networking<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Facebook-based attacks grew dramatically in 2009, and will continue to increase in the coming year. <o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">There are basically two flavors &#8212; viruses that take advantage of the platform&#39;s liberal rules for information sharing among applications; and impersonation\/identity theft, where a criminal hijacks an innocent user&#39;s account and tricks trusted friends and family. But other variations are certain to appear. Criminals can use publicly available information to personalize attacks (&quot;Hey, check out these pictures from Paramus Catholic&#39;s Class of 1986!&quot;). Facebook is easily farmed for password-generating information such as &quot;What was your high school mascot?&quot;<span style=\"mso-spacerun: yes\">&#0160; <\/span>And all those &quot;click here&quot; e-mails from Facebook are a Christmas present for would-be phishers, who can easily imitate them.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;People are getting comfortable in social networking situations and I think that they should really re-examine their level of trust and interaction,&quot; said Mary Landesman, senior security researcher at ScanSafe.<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">And remember, even if Facebook old-timers are too smart for all these tricks, the service is teeming with older newbies.<span style=\"mso-spacerun: yes\">&#0160; <\/span>If you&#39;ve been friended by mom (or grandma) you know what I mean.<span style=\"mso-spacerun: yes\">&#0160; <\/span>They&#39;ll have to endure the Facebook privacy learning curve, too. Be generous.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Spend a few minutes with older relatives this holiday getting them to tighten up their privacy settings.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">5. Botnets<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">The bane of the Internet for the past five years &#8212; botnets, or armies of compromised home computers &#8212; will remain a problem this year.<span style=\"mso-spacerun: yes\">&#0160; <\/span>And they it may be even worse: botnets have become much more resilient.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Once upon a time, botnets could be disrupted by &quot;cutting off their head,&quot; or disabling their command and control computers.<span style=\"mso-spacerun: yes\">&#0160; <\/span>But now, criminals are &quot;building disaster recovery&quot; into the networks, Symantec&#39;s Lee said.<span style=\"mso-spacerun: yes\">&#0160; <\/span>That makes them even more difficult to knock off line.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;You must have grudging respect for them and their techniques,&quot; Lee said.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">6. Spam <o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Spammers took a body blow during 2009 when the notorious McColo Internet Service Provider was kicked off-line.<span style=\"mso-spacerun: yes\">&#0160; <\/span>The volume of spam plummeted from around 80 percent of all e-mail to 20 percent.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Temporarily.<span style=\"mso-spacerun: yes\">&#0160; <\/span>By year&#39;s end, nine out of 10 e-mails were spam, and the number keeps climbing.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;Can it get to 95 percent?,&quot; Lee asked, rhetorically. &quot;It never ceases to amaze me how much we put up with this.&quot;<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">7. Finally, Apple gets respect &#8211; from cybercriminals<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">For years, the worst-kept secret in the computer security world was the safety of using Macintosh computers. It seemed that criminals didn&#39;t bother trying to attack Macs. This was no political statement, however. It was merely pragmatism: Apple products were a small target. But with the uptick in Mac market share, the increasingly popularity of Apple&#39;s Safari Web browser and the ubiquity of the iPhone, expect criminals to target Steve Jobs\u2019 products, says Leonard.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Already, he says, there have been a handful of iPhone attacks.<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;Malware authors know where people are going,&quot; he said. &quot;It&#39;s more worthwhile for them to go after these platforms.&quot;<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">8. Cell phones<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Speaking of iPhones, 2010 might be the year that we see a significant attack against cell phone or smart phone users. Such an attack has been predicted for years, and has not yet materialized.<span style=\"mso-spacerun: yes\">&#0160; <\/span>But each year, cell phones become more powerful, contain more personal information and are used for more financial transactions. In other words, they become &quot;juicier targets&quot; for criminals, says Lee.<span style=\"mso-spacerun: yes\">&#0160; <\/span>An obvious attack &#8212; like something that wipes out phone books &#8212; might not be the breakthrough cell phone virus.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Lee says consumers should be on the lookout for a simple automated way to use mobile phones to steal cash<strong style=\"mso-bidi-font-weight: normal\">. <\/strong>One possibility: some TV shows urge consumers to send text messages at $1 apiece. What happens when a criminal figures out how to redirect such messages, or initiate them?<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">9. SEO poisoning<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">You have probably noticed that companies can &quot;game&quot; Google and other search engines, puffing up their search engine results using a series of tricks such as creating fake pages that link heavily to each other.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Annoying, but relatively harmless.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Unfortunately, bad guys have perfected this method and use it to mercilessly attack information seekers every time a large news event occurs. Perhaps hundreds of thousands of users were infected after the death of Michael Jackson through this technique &#8212; getting a booby-trapped Web page to rank 5th or 6th on a Google &quot;Michael Jackson&quot; search, even for just a few minutes, is probably the most effective malicious program attack used today.<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;We see this sort of attack daily and especially when a signature event occurs, like Michael Jackson&#39;s death,&quot; said Leonard. Expect much more next year.<span style=\"mso-spacerun: yes\">&#0160; <\/span>When the next big news hits &#8212; however self-serving this may sound &#8212; stick with news Web sites you trust.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">10. WINDOWS 7<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Naturally, as the year progresses, criminals will set their sights on the increasing install base of Windows 7.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Microsoft has continued to improve security and delivery of updates to its flagship operating system.<span style=\"mso-spacerun: yes\">&#0160; <\/span>But there will be problems, no doubt. And then there&#39;s this troubling notion: Eight out of 10 existing Windows viruses will run on Windows 7, says Leonard.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Impressive forward-compatibility from the bad guys. For consumers, it means there&#39;s no time to be complacent.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">11. URL shorteners <o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Services like bit.ly make sending links through Twitter and e-mail infinitely easier. Unfortunately, it also means criminals can turn obvious troublesome URLs, like https:\/\/RomanianDarkLords.Ro\/$$$eBay.com into friendly-sounding links like http:\/\/bit.ly\/5uuWwo.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">That makes life easier for criminals, and harder for you, as it takes away one possible hint that a link is trouble.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Websense recently partnered with Bit.ly to help make the process safer. But you should stick with the old rule: Never click on a link you didn&#39;t expect, and always manually type URLs into your browser&#39;s address bar.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><strong style=\"mso-bidi-font-weight: normal\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">12. Gumblar<o:p><\/o:p><\/span><\/font><\/span><\/strong><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Last but not least, Landesman says the most troublesome development of 2009 could be the breakout security problem of 2010. The so-called Gumblar worm used an advanced technique to build a new kind of botnet. Rather than target thousands of home computers, Gumblar attacked Web hosts (Web sites) and turned them into &quot;carriers.&quot;<span style=\"mso-spacerun: yes\">&#0160; <\/span>The program managed to download a Web site\u2019s code, inject a hidden malicious program, then<s> <\/s>reload the now booby-trapped site.<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><a href=\"http:\/\/www.msnbc.msn.com\/id\/11605721\/ns\/business-personal_finance\/\"><img decoding=\"async\" alt=\"Herbbox\" border=\"0\" class=\"asset asset-image at-xid-6a00d83451b0aa69e20120a6792d57970c \" src=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20120a6792d57970c-800wi\" style=\"MARGIN: 4px; FLOAT: left\" title=\"Herbbox\" \/><\/a>Because Web sites act as a kind of hub online, they have the potential to spread a serious attack much more quickly. And 10,000 compromised Web sites are much harder to shut down than 10,000 compromised home computers, Landesman said.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Worse yet, a seriously successful Gumblar-style attack could undermine Web users&#39; trust in the Internet. Sites that are one day safe and trustworthy may the next day be dangerous. That would severely hamper security systems that are based on &quot;trusted&quot; sites.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;When you have compromised sites acting as the host itself, the notion of good vs. bad is completely gone,&quot; Landesman said.<span style=\"mso-spacerun: yes\">&#0160; <\/span>&quot;Users will find that fewer and fewer sites that they can trust whatever trust they do have could be very fleeting.&quot;<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Already, Gumblar-infected sites have transmitted code to visiting PCs that redirected all Google searches to pay-per-click Web sites, netting a tidy sum for creators.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Gumblar was declared a bigger problem than Conficker in May by Scansafe, and even though its network of compromised Web sites was eventually tamed during the year, Landesman is convinced that the technique will see many copycats. <o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;It&#39;s one of the attacks we are assured of seeing in large quantities in 2010,&quot; she said.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; COLOR: black; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"COLOR: black; mso-themecolor: text1\"><font face=\"Verdana\"><span style=\"FONT-FAMILY: Verdana\"><span style=\"FONT-FAMILY: arial, helvetica, clean, sans-serif\"><strong><span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\">Become a&#0160;<\/span><\/strong><a href=\"http:\/\/www.facebook.com\/pages\/Bob-Sullivan\/78714223105?_fb_noscript=1\" style=\"COLOR: blue; CURSOR: pointer; TEXT-DECORATION: underline\" ><strong><span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\">Red Tape Chronicles Facebook fan<\/span><\/strong><\/a>&#0160;<span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\"><strong>or follow me at <\/strong><a href=\"http:\/\/twitter.com\/RedTapeChron\"><strong>http:\/\/twitter.com\/RedTapeChron<\/strong><\/a><\/span><\/span><\/span><\/font><\/span><\/span><\/span><\/span><\/font><\/span><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 9px\"><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><o:p><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><\/span><\/o:p><\/span><\/p>\n<p><\/o:p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>About once a year, computer security news leaps out of the technology section and onto the front page and the top of network news broadcasts.&#0160; This year, the day was April Fools&#39; Day, as the Conficker worm became the latest malicious program with the power to eat the Internet.&#0160; Somehow, we soldiered on, most of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-219340","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/219340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=219340"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/219340\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=219340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=219340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=219340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}