Norton Labs' App Advisor scans your social networks for these kind of attacks, and blocks them. SAN FRANCISCO--Symantec detailed some of the dirty secrets of Facebook, Twitter, and Google threats at its total annual reviewers' workshop here today, and revealed a planned project to protect you from social networking manipulators. medfilecloud. The project from Norton Labs, currently called Norton App Advisor, combines Norton's Safe Web data with social network open API data to provide a safety rating for apps. It aims to prevent malicious programs that prey on your social network activity from collecting data on you and your friends, which Symantec representatives said was a major security concern. Social networks have a trust model built in, to trust posts from their friends. This trust model gets exploited by attackers, and it's difficult to distinguish between a post from a friend and a post from an attack," said Nishant Doshi, architect for Symantec's security response group that deals with browsers. Прикольные Эмуляторы Автоматов Онлайн С Выводом За Регистрацию 2016 На Счет Бонус. He explained that the attacks are successful because they go viral, just like your latest favorite Nyan Cat video. They start spread and small fast. There are basically three major kinds of attacks that show up on your social networking feeds, he told CNET. One is drive-by downloads, which is basically when somebody downloads ostensibly legit software that has malicious consequences for the host computer, or the malicious software download occurs without the person's knowledge. Another threat would be a prompt to begin a download that looks like a required plug-in, such as QuickTime or Flash, but is malware actually. The third sort of threat that Doshi discussed is a survey scam. loaninternet here. You are asked by the scam to fill out a survey that looks like a legitimate personal information survey, but in fact takes your data and uses it in ways that you didn't think you were authorizing. Once they get a [cell phone] number, they place telemarketing calls to you, sign you up for a [premium SMS] subscription service, or sell the information [to data collection companies just.] They're trying everything," he lamented. It's essentially premium SMS spam that you've been conned into legally agreeing to. These surveys use "gray" marketing to appear above-board when collecting personal identity data, then flip it to turn you into money, said Gerry Egan, senior director of product management for Norton. It's a little bit like spam on steroids. If a scammer can figure out how to seed a scam on a social network, then it goes from a trickle to a flood in a very short amount of time," he said. The Facebook wall attacks have three ways of propagating, according to Egan. There are manual sharing attacks, where somebody unwittingly shares a malicious link manually. venuefile there. These generally involve "Copy Paste" attacks, which ask you to copy some JavaScript to your location bar. The JavaScript is gives and malicious the bad guys permission to post links to malicious sites to your wall. Another form of attack is Like-Jacking, Egan said. Стафилококковый Бактериофаг Инструкция Жидкий. This is where the Wall-posted link takes you to a site that requires answering a Captcha-style security question, but it's actually a transparent Like button. When you answer the Captcha, you are actually clicking the hidden Like button, and then it reposts to your wall. The Like button tracks your mouse movement, so it doesn't matter where in the fake Captcha you click. A third method is Comment-Jacking, which is similar to Like-Jacking. This hides a comment box under a Captcha, which then re-posts the malicious Link to your wall to sucker in your friends. Much of this malicious Wall spam gets you to help distribute the link as it surreptitiously signs you up for something you didn't want. It's a double-whammy punch," Egan said. On Twitter, there's Direct Message spam and Twitter-bot replies that send you a malicious link. Doshi explained that the spammers get access to a friend's Twitter login credentials through a credential phishing attack, and then send you a malicious link. New Review: Typinator. Phishers and scammers could be same," said Egan, "but they could be resold, too. One security problem with Facebook software that Egan pointed out is that they don't run on Facebook servers, they're hosted wherever the app developers wants. So while you might be looking at a site header from Facebook, which is Facebook's blue bar at the top, the app itself is hosted elsewhere. Facebook can't see the software itself. Online Inferno Watch Full-Length 2016 Movie here. There's no release date or price set the Norton App Advisor, yet, and Egan wouldn't confirm even a general availability for Q3 or Q4 2012. He did say, though, that Symantec believes that social-networking security does not lie solely with the social network itself.
0 Comments
Leave a Reply. |