Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
  • Go

Fresh Next-G Malicious Software To Capture Behavioral Patterns

According to a warning by security researchers at Massachusetts Institute of Technology (MIT), a fresh malicious program is waiting in the remote which will gradually seize Web-surfers' identity via harvesting personal and behavioral information from their social-networking accounts. ComputerWorld published this in news on October 11, 2010.

While making a forecast, the researchers state that online crooks will most certainly try to design malware, which will steal identity far more dangerously compared to conventional malware. Moreover, anyone who's victimized with theft of behavioral information will not be able to alter his life patterns and static behavior without difficulty, they add.

Meanwhile, experts from Deutsche Telekom Laboratories, Ben Gurion University along with MIT present ways with which a treacherous attack based on malware can work out successfully while utilizing social-networking websites as the main vector.

To justify their claim, the MIT researchers released one study titled "Stealing Reality" in which they discuss how important information can be stolen from social networking websites and their members with the help of a non-aggressive malware agent that's consequently difficult to identify. Dark Reading published this in news on October 11, 2010.

Ben Gurion University's Yaniv Altshuler as well as other computer experts in support of MIT researchers' as well as other computer experts' reports said that one fresh malware family would attack and pull out data regarding relationships as well as accumulate link patterns within social networks of the real world. ComputerWorld reported this.

Elaborating further Altshuler stated that creators of malware could as well use the same algorithms and techniques during future malware creation. In fact they might've already begun implementing the practice. The concept was really to unleash certain malicious software which would seize the link models from a network. That software would be extremely difficult for detecting, Altshuler added. Blacklistednews published this in news on October 10, 2010.

Although the above kind of malicious software is sure to be thorough as well as will proliferate gradually for avoiding detection by network administrators and/or anti-virus programs, it may not be so simple to keep away from this new attack, the specialists believe.

Related article: Fark.com Files Suit against Suspected Hacker from Fox13

» SPAMfighter News - 22-10-2010

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next