- Social Networking Exploring LinkedIn Look-Alike Email Spam Campaigns
LinkedIn-themed spam effectively distributes malicious links because users are conditioned to receive and click LinkedIn emails—often without visiting the site directly. Campaigns have led to exploit...
- Social Networking Why There Are Fewer LinkedIn Scams and Malware Than Facebook Ones
LinkedIn sees fewer scams than Facebook because users visit less frequently, its apps platform is limited, and professional mindset makes users more cautious. However, LinkedIn is still risky—many...
- Malware AppLocker for Containing Windows Malware in the Enterprise
AppLocker in Windows 7 and Server 2008 R2 can block known malicious executables based on publisher signature, file location, or hash—distributed centrally via Group Policy. This helps contain malware...
- Malware The Use of the Modern Social Web by Malicious Software
Modern malware exploits the social web ecosystem: using social networking sites for command-and-control, controlling social media content for financial/political rewards, distributing links for...
- Malware The Use of Social Engineering by Mobile Device Malware
Mobile malware spreads primarily through social engineering rather than exploits. Techniques include disguising trojans as legitimate apps (DroidDream looked like "Super Guitar Solo"), directing...
- Malware Learn Better Security Breach PR from Harold Sun's Halfhearted Apology
Herald Sun's website was compromised to serve rogue antivirus, but their brief apology offered few details and underplayed the risk. Better post-incident communications require promptness, clarity,...