A recent PCMag.com blog post points out that the fake White House website whitehouse.org (no, I won't link you to it) has been hacked and is serving up malware. Part of the issue here is that many people attempting to go to the government website www.whitehouse.gov will accidentally mistype it as whitehouse.org. This is a specific case of a very real threat.
If you look at the list of the top 500 most popular websites according to Alexa.com. How many of these domain names are easily misspelled or mistyped? There is nothing stopping bad people from registering common typos of popular do...
One of the best parts of my job is not just laying out the strategy for Symantec's Consumer Business, but getting out and telling people where Norton is headed in six months, 12 months, or even two years. Why is this so rewarding? Because we've got a rich and compelling story to tell. We aren’t just talking about security software — we're looking at solving consumer problems in brand new ways. Recently, I've spent some time sharing our vision with some of the key people in our industry. Neil Rubenking at PC Magazine was one of our stops and following our conversation, he put out a compreh...
Jaqcqui Cheng from Ars Technica has a great article today about the latest email scam design to trick people into giving up their personal information (including social security number and mother's maiden name), this time, the email is supposedly from the iTunes store and links to a poorly crafted site. You should check out Robert Vamosi's article on Cnet about this as well.
Okay, so this is really nothing new, we talk about phishing scams all the time. However, like Jacqui writes in her article, this is interesting because Apple users are getting targeted. iTunes is cross platform, lot...
“Whaling”. The term brings up images of Captain Ahab and harpoons. For some folks, “whaling” brings up thoughts of deep-pocketed Vegas high-rollers. Unfortunately, what I’m referring to is a product of today’s online threats. It’s a new phishing scam called “whaling” and its emerged to target the big fish – top-level corporate executives at leading companies and organizations. By doing some easy research up front, phishers can hit those at the top with surprising success because most corporate email conventions are easy to figure out (eg. First initial_last nameatcompanydotcom). These...
Does your security software do any of the following things?
• guard against virus activity before users see the effects of it
• keep hackers from stealing personal information
• prevent the system from becoming a zombie
• thwart phishing attacks from getting people to give away data
• stop malware and spyware from installing themselves
If your answer is yes (and I hope it is!) then your software is using up some amount of the system’s memory in order to keep you safe. Symantec’s mission is to make this protection impact as minimal as possible while st...
I have been out for a bit (conference, two weddings and lots of airports) but I just wanted to post the following video that we did discussing vulnerabilities, specifically the one that happened at CanSec West. Mighty props out to Rob Pegoraro's article that started the discussion in the first place!
Message Edited by jgonzales on 05-09-2008 03:00 PMMessage Edited by mikeromo on 05-15-2008 02:15 PM
I had the pleasure of meeting some of my Symantec Italy colleagues at a recent conference in Vegas, but I had no idea that Lee Majors was part of the team. I was delighted to see that the product development team’s focus on performance has been resonating internationally; here’s a link to a light-hearted video they created to showcase the bionic performance of Norton Internet Security 2008:
Message Edited by jgonzales on 05-21-2008 11:04 PM
As a follow-up to my earlier post this week, I noticed that Walt Mossberg posted today a helpful article and short video clip on "social engineering" that offers several specific tips on avoiding online scams. For example:
1. Never, ever click on a link embedded in an email that appears to come from a financial institution, even if it’s your own bank or brokerage and even if it looks official right down to the logo. The same goes for payment or auction services, like PayPal or eBay (EBAY).
More solid tips are available at Mossberg's All Things Digital site.
I also recommend related post...
Earlier today I came across a CNET blog entry wherein Ina Fried discusses the recent purchase of a refurbished iPod that arrived with a virus on it. Although Ina's article is about an iPod, it reinforces the reality of today's threat landscape: malware can come from anywhere.
As we look at the Genesis of Computer Viruses (see The Art of Computer Virus Research and Defense, by Peter Szor), we can't help but remember the days when the vast majority of personal computer malware spread via physical interaction between computers, usually in the form of floppy disks. These early viruses operat...