Similar Posts
Facebook makes user profiles more visual
Though it is primarily known as a social networking site, Facebook is actually one of the top destinations for photo sharing, and a new user profile design change unveiled Monday ups the visibility of Facebook photos and encourages users to share personal information in a more visual way. Two years ago, Facebook came forward with…
Check Your Friends! Facebook IMs May Lead To Trouble
I ran into a few strange IMs over the weekend. When I was not shoveling out my driveway from the 15 inches of snow that covered it I was logged into Facebook telling people about it…. It was then that I started receiving some VERY interesting IMs from a friend extolling the virtues of a…
Масленица Началась, And So Is Spam!
Symantec Connect: Maslenitsa (Маслница) is a religious holiday celebrated in Russia and Ukraine during the last week before Lent, i.e. the seventh week before Pascha (Easter). This festival is also known as Pancake week or Butter week. During this week people enjoy the social activities that are forbidden during the prayerful Lenten season, such as…
Symantec Reputation-based Security: Suspicious.Insight detections on VirusTotal
Symantec recently upgraded their scanner on VirusTotal to include their new reputation-based security engine. That has caused a spike in their detection rates, in particular Suspicious.Insight detections, and so I thought I’d take a few minutes to explain some of the background and what is going on. So what exactly is a Suspicious.Insight detection? These detections are derived from…
4.4 percent in China have no AV – that might not be too bad
The number for the rest of the world might be 26 percent There is a story making headlines on the computer security news sources today about estimates that 4.4 percent of Chinese Internet users have no anti-virus software, up from 3.9 percent last year. That’s about 17 million machines. The numbers came from surveying by…
Journey to the Center of the PDF Stream
Malware authors use numerous unconventional techniques in their attempts to create malicious code that is not detected by antivirus software. As malicious code analysts, though, it is our job to analyze their creations, and as such we have to be constantly vigilant for the latest tricks that the malware authors employ. While looking at some…