Last Updated: 2010-01-27 23:24:06 UTC
by Raul Siles (Version: 1)
In the past we have already covered how attackers are using SEO (Search Engine Optimization) poisoning techniques to modify the results obtained from search engines, mainly Google, to point to malicious web sites or accomplish other malicious activities, for example, vishing attacks or IFRAME SEO attacks.
Recently we got details about two active SEO poisoning attacks for two specific hot topics:
- A new Facebook unnamed app. Sample search term: "facebook unnamed app".
- Today's Apple tablet announcement, called iPad. Sample search term: "apple tablet announcement".
The related search terms for these two hot topics in Google are returning top results pointing to sites that distribute malware.
Apart from the common defense-in-depth practices regarding client and end point protection, one of the best recommendations is to demonstrate this type of attack on your security awareness programs, so that users do not blindly trust any output they get from search engines.
Last Updated: 2010-01-27 20:18:35 UTC
by Raul Siles (Version: 1)
A while ago I realized we've never mentioned the Command Line Kung Fu blog on the ISC diary. It is authored by a group of good ISC friends and was born on 2009. Definitely, it is a well worth resource to review for ISC readers, specially security and system admins, interested on getting the most out of the command line capabilities of different operating systems, such as Windows (including PowerShell), *nix, and Mac OS X.
PS: This is specially dedicated to those passionate about how things work, internals, and troubleshooting tasks... such as JSV!
Last Updated: 2010-01-27 00:19:53 UTC
by Raul Siles (Version: 3)
The Campus Party Europe 2010 (http://www.campus-party.eu) will take place on Madrid, April 14-18, 2010, during the Spanish Presidence of the European Union. One of the tracks in the event is the Network Security Area (http://www.campus-party.eu/NetworkSecurity.html), which includes a Security or Hacking Challenge, apart from other security related lectures from renowned speakers. The organizers are selecting two people for each member country of the European Union to participate on this challenge based on their enthusiasm, talent, and technical skills; travel and accommodation are fully covered .
If you are an ISC reader that were born in any EU country and want to participate and represent your country, hurry up, and send your submission! The official deadline is January 31, 2010, although there is a chance it can be slightly extended a few days. It seems the challenge will cover multiple infosec areas, such as reverse engineering, crypto, web-app security, network security, etc.
More information about the official announcement, including where to send your submission, available at http://seclists.org/bugtraq/2009/Dec/257.
Unfortunately, I won't be able to attend as I will be teaching the SANS "Security 542: Web App Penetration Testing and Ethical Hacking" track on Dubai, SANS UAE 2010, April 17-22.
Please choose a specific diary above to comment