Serena Serves Up an Ace for Malware Pushers
- 15 September, 2009 12:44
<p>Cyber criminals are exploiting Serena Williams' US Open semi-final outburst yesterday to ignite a Search Engine Optimisation (SEO) campaign that could result in internet users unwittingly downloading malicious software, warns Symantec. The video of Serena Williams serving an angry volley at a line judge is currently one of the internet’s most hotly searched items, but curious surfers should take care of where they watch it for fear of scoring their own double fault.</p>
<p>Internet users searching for terms such as "Serena Williams Outburst" could easily be directed to a domain called pixnat.com. While this looks like a genuine website, Symantec has discovered it is hacked and hosts fake antivirus scanners.</p>
<p>Hon Lau, Senior Security Response Manager at Symantec, said, “Unwary visitors to this site will instantly see browser windows pop-up warning them of various security threats, before being offered the chance to download a program that will fix them. They should refuse this as this is fake antivirus software that could harm their computers.”</p>
<p>“This attack, otherwise known as ‘SEO poisoning’ is exactly the kind of thing that opportunistic criminals do to take advantage of people’s natural curiosity,” continued Hon. “It is a small attack at the moment, but serves to show how dangerous misleading applications can be. They might look like legitimate software, but they’re there to harvest your personal details and hold your computer to ransom. Unless users want to put themselves at risk of identity theft or fund organised crime we’d advise them to stay well away.”</p>
<p>+61 2 9954 3492</p>
<p>+61 2 8220 7158</p>
- The week in security: Spying toy banned as Yahoo learns the real cost of a data breach
- Cybersecurity means asking questions but too many young women lack the confidence: head geek
- Is your organisation ready for the new data breach notification legislation?
- Australian businesses failing to convince young women about ICT’s possibilities
- Who should be on an insider risk team?