Vulnerabilities / Threats
8/25/2009
01:59 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
Repost This

Jessica Biel Searches Deemed Most Dangerous

Searching for celebrities may be one of the most effective ways to infect your computer.

In its third annual list of the most dangerous celebrities in cyberspace, McAfee has found that 20% of searches for "Jessica Biel," "Jessica Biel downloads," Jessica Biel photos" and the like lead to Web sites where malicious content has been detected.

The company defines malicious content as spyware, adware, spam, viruses, or phishing mechanisms. Visiting sites hosting such content, particularly using a computer with software that hasn't been updated to the latest version, can often result in that computer being compromised.

Cybercriminals know that celebrities and popular news generate significant interest among Internet users and thus try to place malware at sites where visitors might seek that sort of information. When such sites prove secure, they will create their own sites with malicious content or post malicious content though a user content submission mechanism and then create spam messages and external Web links to drive search traffic to their trapped sites.

"Cybercriminals are star watchers too -- they latch onto popular celebrities to encourage the download of malicious software in disguise," said Jeff Green, SVP of McAfee Avert Labs, in a statement. "Consumers' obsession with celebrity news and culture is harmless in theory, but one bad download can cause a lot of damage to a computer."

McAfee's list of the top ten most dangerous celebrity searches includes:

01. Jessica Biel
02. Beyoncé
03. Jennifer Aniston
04. Tom Brady
05. Jessica Simpson
06. Gisele Bundchen
07. Miley Cyrus
08. Megan Fox, Angelina Jolie
09. Ashley Tisdale
10. Brad Pitt

If someone or something is popular online, count on cybercriminals trying to associate the topic with malware. Last month, MX Logic, another security company, noted that spammers were using Google Hot Trends, a list of popular search topics, to target spam.

Google, Microsoft, and Yahoo all make an effort to flag, block or remove malicious content from their search indexes, but cybercriminals typically can create new malicious sites at least as quickly as old malicious content can be removed.

InformationWeek Analytics has published an independent analysis on strategic security. Download the report here (registration required).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web