Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Search Operation on Osama Bin Laden: Malware Spread

Security experts claimed that just as the death of Osama Bin Laden presents an opportunity for celebration to the Western allies. These can also turn out to be equally advantageous for malware writers who can take undue opportunity of this occasion in spreading malware and extraordinary news, reports SC MAGAZINE on May 02, 2011.

Almost instantaneously, after the news of his death was affirmed, security industry experts were on their toes to adept to all unwanted spam event. Spammers and scammers as proved earlier wait for such occasion claimed Roger Thompson, Vice President of AVG's web threat research team, reports V3.co.uk on May 02, 2011.

Immediately after the declaration of Osama's death by the US President Obama, keywords on this news over flooded search engine operations of Google. Eventually, Google index started to become saturated with news related to the event and keywords related to the military operation that out turned Osama and the search engine is still overflowing with such news.

The spiteful site that still dominates the search engine operation is still ranking the highest in terms of anti-virus applications. These kinds of malevolent software will turn down the speed of a system and make it completely useless. Similar fake software will however promote these types of variant as a system optimization tool, such as a registry cleaner. This infected system is however turned down by a loss function and a flood of false warnings.

It is therefore, advised not to click on any link that points out to be a news site. Rather one should visit a reliable news source and type its link, suggested Steve according to the news published in SC MAGAZINE on May 02, 2011.

Martin also added by saying that Twitter users hold a personal responsibility towards not tweeting back on short URLs that are related to the death of Bin Laden.

It has been revealed that sites that are compromised majorly belong to the WordPress blogs or legitimate domains. The hijacked domains utilize JavaScript once loaded that redirects a victim to the ultimate attack point.

However, the best way in overcoming these kinds of fraudulent events is to stick to the original and reliable news organizations.

Related article: Surge in Spam attack

ยป SPAMfighter News - 5/5/2011

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next