Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Video Demonstration of Poisoned Search

Cybercriminals are manipulating the Internet to cause their poison websites to appear at the top of search results.

When people click the link, a bogus “scareware” window opens, as I have warned about in several prior articles.
(please see Security Alert — An Infection Has Been Detected!)

This installs a “rogue” anti-malware application. This video from security firm Panda Security shows exactly how this is done, and in this case, the criminal is trying to install MS Antispyware 2009.. which is just one of the thousands of these “rogues”.

I highly recommend that you watch it, as it is showing you two (increasingly common) attacks.. and exactly how a “rogue” looks and acts.

Vodpod videos no longer available.

more about “untitled“, posted with vodpod

Please note: I have one, MAJOR, complaint about this video: it pretty much says that if you have an up-to-date anti-malware (such as an antivirus) on board, you’ll be protected from these things. WRONG! Once you click the links, ignore the the warnings, and click “Run”.. you’re hosed. (And you did it to yourself.)
Telling your machine to ‘run it’ bypasses all your protections.. even Vista’s annoying UAC.

Today’s free link: ErrorRepairTOOL Computer Infection? – Blame Your Search Engine!

Today’s free download(s): The best defense is to NOT click “Run” when you’re not sure. But there are tools you can add to your web browser to help you detect and avoid these poisoned websites in the first place — known as “anti-phishing”. I suggest installing both:
WOT: (Web Of Trust) is a free Internet security add-on for your browser. It will help keep you safer from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky Website. It’s easy and it’s free.
Link Scanner Lite: Automatically inspect search results for exploits, hacked sites, fraud/crimeware, and other online threats. Includes right-click, on-demand scanning of any URL you choose.

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

April 18, 2009 - Posted by | advice, computers, cyber crime, Internet, Internet scam | , , , , , , , , , , , , , , , , ,

2 Comments »

  1. TechPaul,

    Thanks for sharing this article with us… I especially like the excellent point you are making that once you click the mouse (pull the trigger)and telling your machine to ‘run it’, it will bypass all your protections.. even Vista’s annoying UAC.

    Rick

    Like

    Comment by whatsonmypc | April 19, 2009 | Reply

    • Yup, “pull the trigger” is an excellent analogy!

      Sadly, most people have been conditioned to click without reading/thinking.

      Like

      Comment by techpaul | April 19, 2009 | Reply


Post your Comment/Question

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: