Vulnerabilities / Threats
8/25/2009
01:59 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Jessica Biel Searches Deemed Most Dangerous

Searching for celebrities may be one of the most effective ways to infect your computer.

In its third annual list of the most dangerous celebrities in cyberspace, McAfee has found that 20% of searches for "Jessica Biel," "Jessica Biel downloads," Jessica Biel photos" and the like lead to Web sites where malicious content has been detected.

The company defines malicious content as spyware, adware, spam, viruses, or phishing mechanisms. Visiting sites hosting such content, particularly using a computer with software that hasn't been updated to the latest version, can often result in that computer being compromised.

Cybercriminals know that celebrities and popular news generate significant interest among Internet users and thus try to place malware at sites where visitors might seek that sort of information. When such sites prove secure, they will create their own sites with malicious content or post malicious content though a user content submission mechanism and then create spam messages and external Web links to drive search traffic to their trapped sites.

"Cybercriminals are star watchers too -- they latch onto popular celebrities to encourage the download of malicious software in disguise," said Jeff Green, SVP of McAfee Avert Labs, in a statement. "Consumers' obsession with celebrity news and culture is harmless in theory, but one bad download can cause a lot of damage to a computer."

McAfee's list of the top ten most dangerous celebrity searches includes:

01. Jessica Biel
02. Beyoncé
03. Jennifer Aniston
04. Tom Brady
05. Jessica Simpson
06. Gisele Bundchen
07. Miley Cyrus
08. Megan Fox, Angelina Jolie
09. Ashley Tisdale
10. Brad Pitt

If someone or something is popular online, count on cybercriminals trying to associate the topic with malware. Last month, MX Logic, another security company, noted that spammers were using Google Hot Trends, a list of popular search topics, to target spam.

Google, Microsoft, and Yahoo all make an effort to flag, block or remove malicious content from their search indexes, but cybercriminals typically can create new malicious sites at least as quickly as old malicious content can be removed.

InformationWeek Analytics has published an independent analysis on strategic security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.