Friday, March 21, 2014

Exploring Uncharted Waters: The Deep Web and Tor

blog_onion


New terminology floats around the ocean of the Internet in waves. Terms pop up on a near daily basis, and while some of them almost instantaneously disappear others enter popular usage even when most net citizens have no idea what they mean, let alone begin to grasp their technical inter-workings. This is a perennial problem in the world of information security.


As of late, you might have noticed that two of these terms are beginning to pop up in the news quite a bit. One is Deep Web, and the other is Tor. Both are terms that have actually been around for over a decade, but the general public’s increasing concern over digital security has recently placed them in the spotlight. With stories on the NSA making near daily headlines, and even ransomware Cryptolocker’s notable utilization of Tor, many are learning about these Internet undergrounds for the very first time. The terms Deep Web and Tor are finally starting to make a few ripples, and, for many, their territories represent completely uncharted waters.


What is the Deep Web?


The term “Deep Web” was first defined in 2001 by Bright Planet’s Michael K. Bergman but has origins as early as 1994, when Jill Ellsworth referred to an “invisible Web.” Today, the “Deep Web” refers to websites that are not indexed by major search engines such as Google, Bing, and Yahoo. Deep web websites exist beneath the surface of the known and indexed web, and in its entirety the Deep Web is actually orders of magnitude larger than the surface web. The Deep Web is massive, ever-growing, and not completely accessible. Not surprisingly,it is also a breeding ground for malware and criminal activity.


In all, the Deep Web is comprised of a number of subsections, one of which is the Tor Network. Tor is used by people who want to access the Internet anonymously, and the network has actually been around since 2002. Common knowledge of Tor has yet to be established, but usage of the term is no doubt growing,  and this is no doubt related to the media’s continual focus on Edward Snowden and the NSA. For this reason, the terms Tor and Deep Web often get confused and used interchangeably, but it is important to understand that this is not the case. The Tor Network is simply a piece of the Deep Web, and because it is freely accessible to anyone with a computer it is simply more well-known than other pieces.


Some Other Deep Web Territories


In addition to the Tor Network, The Deep Web is comprised of a number of known and unknown subsets. Listed below are just a few of the largest.


The Dynamic Web

The majority of the known, Deep Web is comprised of the dynamic content generated when users query databases and actually has nothing to do with underground criminal networks. Surface web webpages are surface level because they are static, relatively permanent, and therefore index-able. Dynamic webpages, on the other hand, only exist when they are generated by a specific user query, such as a search engine request or the submission of a form. This makes indexing dynamic webpages quite difficult from a technical standpoint, because dynamic webpages don’t always ‘exist’ and regularly change form.


The Private Web

The term Deep Web also applies to sites that exist only on a private Intranet (like you might have at work) and sites that exist on the regular Internet but are password protected. The privatized nature of both types of these websites prevents them from being accessed by web crawlers, the automated programs used by search engines to index the known and static web. Naturally, those who program and distribute malware create private Intranets and password protected websites on the regular Internet to collaborate covertly.


The Internet of Things

The Internet of Things (IoT) can also be considered a section of the Deep Web, although parts of it have been indexed by security firms like Shodan. The Internet of Things is essentially a subset of the Internet, by machines and for machines. It’s the Internet of smart refrigerators and automated thermostats, the Internet of motion sensitive street lights and industrial controls. Strictly speaking, the Internet of Things is an Internet of machine language data, and in addition to being un-indexed a good portion of it is also unsecured, which makes it a potential target for attackers.


Diving Deeper with Tor


One of the best ways to achieve a better understanding of any piece of technology is to play around with it. The same can be said for the Deep Web, and, more specifically, Tor. Tor is a web browser that allows its users to access the Internet anonymously; this includes the regular surface-level web of .COMs, .ORGs, .EDUs, and the like, but also .ONION websites that exist only on the Tor Network. That’s right: .ONION. T.o.r. is actually an acronym, and it stands for “The Onion Router” network. Tor is so named because of the way it enables online anonymity through a series of multilayered nodes that is structurally similar to an onion. Normally when you connect to a website, you’re going from point A to point B, and both points can be identified by their unique IP address. On Tor, visiting a website is more like a trip from point A to point Z, with stops at every point in between. This process is necessarily slower, but it does work to scramble the IP address of every point, or node, in the process – thereby ensuring the anonymity of every computer involved.


Tor is therefore an excellent tool for anyone who wants to protect their personal privacy, malicious computer programmers and other criminals included. For example, Tor can be used by political journalists or whistle-blowers to speak out against the injustices of an oppressive government, but it can also be used by terrorists to communicate anonymously. Even worse, Tor can be used to buy and sell weapons, drugs, or other illegal goods. At its darkest, Tor can even be used to distribute illegal pornography. With all of this in mind, you might be wondering why you’d ever want to explore Tor and why we’d even recommend doing so. No doubt it sounds like a dangerous place, populated by criminals and hackers, and it is certainly portrayed by the media as such. What complicates matters further is that Tor domains are essentially obfuscated to the human eye. In addition to ending in .ONION, most Tor domains are written as a random series of numbers and letters, producing web addresses that look like this:


http://3g2upl4pq6kufc4m.onion/


That means that when users encounter a link to a new .ONION domain, they really have no way of knowing where it will lead, and clicking on it could very well take them somewhere they really don’t want to go. Nevertheless, exploring Tor can be an educational experience. At the very least, a trip through Tor can illustrate just how little of which the web the typical Internet user is aware and just how dangerous the Internet can actually be – much like a walk through a rougher part of town can be a real eye opener.


Fittingly enough, Tor exploration really only has one rule: download Tor from the official Tor website: https://www.torproject.org/projects/torbrowser.html.en. And, if-and-when you start exploring, click at your own risk.


Deep Web Dangers and Deep Web Malware


Criminal Activity

It is true that criminals use Tor, but not everyone who uses Tor is a criminal. People who use the Tor browser simply want to protect their online identity. Remember, Tor is a browsing application and you can use it to surf the regular surface level web as well as the Deep Web Tor Network. You may encounter and/or witness criminal activity in either environment, but the truth is that most serious criminals take additional efforts to mask their activities from average citizens.


Deep Web Malware

Most people worry: Can my computer get infected just by going on the Tor Network?


The short and simple answer to this question is: Yes – but, not because of anything specific to Tor. Your computer can become infected with malware through the Tor Network for the exact same reason it can get infected with malware through Internet Explorer while browsing the surface web: Attackers host malware on domains. One would of course think that an attacker has more incentive to host malware on a .ONION domain because their identity is anonymized; however, you are actually more likely to encounter malware on the surface web, simply because more people use it and because the average malware author is a financially motivated being who wants to infect as many computers as possible.


The Deep Web and Tor are not malware insignificant, though. Much as they do for any other criminal, the Deep Web and Tor enable anonymity, which is highly attractive to malware authors and distributors who want to collaborate anonymously with their team.


Perhaps most interestingly, Tor can also allow attackers to connect infected users to an anonymous Command and Control server through the surface web! This third possibility is performed through a manipulation of the svchosts.exe file, which controls how your computer connects to the Internet. Essentially, this technique relies on a covert installation of the Tor web browser, and then a reconfiguration of the svchosts.exe file so that your computer covertly connects to a malicious server on the Tor Network. Such a connection can be used to command, control, and/or monitor your computer anonymously or connect it to a botnet.


Deep Web Scams

Lastly, anyone venturing into any region of the Deep Web needs to be wary of getting scammed. Whether you’re exploring Tor or simply interacting with someone on an un-indexed Intranet or password protected website, it is crucial to remember that that interaction is practically untraceable. That means if you decide to transfer funds or personal information, the other party can scam you and walk away scot-free.


Deep Web Protection: Emsisoft’s Shield and The Double Edged Sword


Despite the aura of dangerousness surrounding the Deep Web, it can be explored safely. Emsisoft Anti-Malware protects users from malware no matter where they encounter it. Deep Web malware uses the same signatures and displays the same behavioral patterns as surface web malware; it is simply located in a different environment. The true dangers of the Deep Web are those that exist beyond the realm malware. The Deep Web is deep and dark, and for every positive use it provides it also enables a criminal activity. Sadly, this is true of most technology throughout human history: it is a double-edged sword.


Perhaps the most important takeaway from this Deep Web primer is to remember that is exactly that – a primer. Tor is simply a subsection of a truly massive amount of information that exists and is growing beneath the surface level web as we know it. Exploring this subsection is completely optional, but recognizing its existence is mandatory for anyone who wants to maintain comprehensive digital security. Utilizing the benefits of Tor can also allow one to browse the surface web in anonymity and maintain their personal privacy; and, yet, it is really only one of many ways to do so.


As the ocean of our Internet continues to grow, so will opportunities to connect to new people, be they friendly, malicious, or neutral. Regardless, new territories call for new language, and we hope that at the very least you can now understand what people mean when they use the terms Deep Web and Tor. A connected world should be a Malware-Free World, and knowledge of that world is half the battle.


As for you brave explorers ready to dive deep into the heart of the onion…Bon voyage!





Exploring Uncharted Waters: The Deep Web and Tor

Exploring Uncharted Waters: The Deep Web and Tor

blog_onion


New terminology floats around the ocean of the Internet in waves. Terms pop up on a near daily basis, and while some of them almost instantaneously disappear others enter popular usage even when most net citizens have no idea what they mean, let alone begin to grasp their technical inter-workings. This is a perennial problem in the world of information security.


As of late, you might have noticed that two of these terms are beginning to pop up in the news quite a bit. One is Deep Web, and the other is Tor. Both are terms that have actually been around for over a decade, but the general public’s increasing concern over digital security has recently placed them in the spotlight. With stories on the NSA making near daily headlines, and even ransomware Cryptolocker’s notable utilization of Tor, many are learning about these Internet undergrounds for the very first time. The terms Deep Web and Tor are finally starting to make a few ripples, and, for many, their territories represent completely uncharted waters.


What is the Deep Web?


The term “Deep Web” was first defined in 2001 by Bright Planet’s Michael K. Bergman but has origins as early as 1994, when Jill Ellsworth referred to an “invisible Web.” Today, the “Deep Web” refers to websites that are not indexed by major search engines such as Google, Bing, and Yahoo. Deep web websites exist beneath the surface of the known and indexed web, and in its entirety the Deep Web is actually orders of magnitude larger than the surface web. The Deep Web is massive, ever-growing, and not completely accessible. Not surprisingly,it is also a breeding ground for malware and criminal activity.


In all, the Deep Web is comprised of a number of subsections, one of which is the Tor Network. Tor is used by people who want to access the Internet anonymously, and the network has actually been around since 2002. Common knowledge of Tor has yet to be established, but usage of the term is no doubt growing,  and this is no doubt related to the media’s continual focus on Edward Snowden and the NSA. For this reason, the terms Tor and Deep Web often get confused and used interchangeably, but it is important to understand that this is not the case. The Tor Network is simply a piece of the Deep Web, and because it is freely accessible to anyone with a computer it is simply more well-known than other pieces.


Some Other Deep Web Territories


In addition to the Tor Network, The Deep Web is comprised of a number of known and unknown subsets. Listed below are just a few of the largest.


The Dynamic Web

The majority of the known, Deep Web is comprised of the dynamic content generated when users query databases and actually has nothing to do with underground criminal networks. Surface web webpages are surface level because they are static, relatively permanent, and therefore index-able. Dynamic webpages, on the other hand, only exist when they are generated by a specific user query, such as a search engine request or the submission of a form. This makes indexing dynamic webpages quite difficult from a technical standpoint, because dynamic webpages don’t always ‘exist’ and regularly change form.


The Private Web

The term Deep Web also applies to sites that exist only on a private Intranet (like you might have at work) and sites that exist on the regular Internet but are password protected. The privatized nature of both types of these websites prevents them from being accessed by web crawlers, the automated programs used by search engines to index the known and static web. Naturally, those who program and distribute malware create private Intranets and password protected websites on the regular Internet to collaborate covertly.


The Internet of Things

The Internet of Things (IoT) can also be considered a section of the Deep Web, although parts of it have been indexed by security firms like Shodan. The Internet of Things is essentially a subset of the Internet, by machines and for machines. It’s the Internet of smart refrigerators and automated thermostats, the Internet of motion sensitive street lights and industrial controls. Strictly speaking, the Internet of Things is an Internet of machine language data, and in addition to being un-indexed a good portion of it is also unsecured, which makes it a potential target for attackers.


Diving Deeper with Tor


One of the best ways to achieve a better understanding of any piece of technology is to play around with it. The same can be said for the Deep Web, and, more specifically, Tor. Tor is a web browser that allows its users to access the Internet anonymously; this includes the regular surface-level web of .COMs, .ORGs, .EDUs, and the like, but also .ONION websites that exist only on the Tor Network. That’s right: .ONION. T.o.r. is actually an acronym, and it stands for “The Onion Router” network. Tor is so named because of the way it enables online anonymity through a series of multilayered nodes that is structurally similar to an onion. Normally when you connect to a website, you’re going from point A to point B, and both points can be identified by their unique IP address. On Tor, visiting a website is more like a trip from point A to point Z, with stops at every point in between. This process is necessarily slower, but it does work to scramble the IP address of every point, or node, in the process – thereby ensuring the anonymity of every computer involved.


Tor is therefore an excellent tool for anyone who wants to protect their personal privacy, malicious computer programmers and other criminals included. For example, Tor can be used by political journalists or whistle-blowers to speak out against the injustices of an oppressive government, but it can also be used by terrorists to communicate anonymously. Even worse, Tor can be used to buy and sell weapons, drugs, or other illegal goods. At its darkest, Tor can even be used to distribute illegal pornography. With all of this in mind, you might be wondering why you’d ever want to explore Tor and why we’d even recommend doing so. No doubt it sounds like a dangerous place, populated by criminals and hackers, and it is certainly portrayed by the media as such. What complicates matters further is that Tor domains are essentially obfuscated to the human eye. In addition to ending in .ONION, most Tor domains are written as a random series of numbers and letters, producing web addresses that look like this:


http://3g2upl4pq6kufc4m.onion/


That means that when users encounter a link to a new .ONION domain, they really have no way of knowing where it will lead, and clicking on it could very well take them somewhere they really don’t want to go. Nevertheless, exploring Tor can be an educational experience. At the very least, a trip through Tor can illustrate just how little of which the web the typical Internet user is aware and just how dangerous the Internet can actually be – much like a walk through a rougher part of town can be a real eye opener.


Fittingly enough, Tor exploration really only has one rule: download Tor from the official Tor website: https://www.torproject.org/projects/torbrowser.html.en. And, if-and-when you start exploring, click at your own risk.


Deep Web Dangers and Deep Web Malware


Criminal Activity

It is true that criminals use Tor, but not everyone who uses Tor is a criminal. People who use the Tor browser simply want to protect their online identity. Remember, Tor is a browsing application and you can use it to surf the regular surface level web as well as the Deep Web Tor Network. You may encounter and/or witness criminal activity in either environment, but the truth is that most serious criminals take additional efforts to mask their activities from average citizens.


Deep Web Malware

Most people worry: Can my computer get infected just by going on the Tor Network?


The short and simple answer to this question is: Yes – but, not because of anything specific to Tor. Your computer can become infected with malware through the Tor Network for the exact same reason it can get infected with malware through Internet Explorer while browsing the surface web: Attackers host malware on domains. One would of course think that an attacker has more incentive to host malware on a .ONION domain because their identity is anonymized; however, you are actually more likely to encounter malware on the surface web, simply because more people use it and because the average malware author is a financially motivated being who wants to infect as many computers as possible.


The Deep Web and Tor are not malware insignificant, though. Much as they do for any other criminal, the Deep Web and Tor enable anonymity, which is highly attractive to malware authors and distributors who want to collaborate anonymously with their team.


Perhaps most interestingly, Tor can also allow attackers to connect infected users to an anonymous Command and Control server through the surface web! This third possibility is performed through a manipulation of the svchosts.exe file, which controls how your computer connects to the Internet. Essentially, this technique relies on a covert installation of the Tor web browser, and then a reconfiguration of the svchosts.exe file so that your computer covertly connects to a malicious server on the Tor Network. Such a connection can be used to command, control, and/or monitor your computer anonymously or connect it to a botnet.


Deep Web Scams

Lastly, anyone venturing into any region of the Deep Web needs to be wary of getting scammed. Whether you’re exploring Tor or simply interacting with someone on an un-indexed Intranet or password protected website, it is crucial to remember that that interaction is practically untraceable. That means if you decide to transfer funds or personal information, the other party can scam you and walk away scot-free.


Deep Web Protection: Emsisoft’s Shield and The Double Edged Sword


Despite the aura of dangerousness surrounding the Deep Web, it can be explored safely. Emsisoft Anti-Malware protects users from malware no matter where they encounter it. Deep Web malware uses the same signatures and displays the same behavioral patterns as surface web malware; it is simply located in a different environment. The true dangers of the Deep Web are those that exist beyond the realm malware. The Deep Web is deep and dark, and for every positive use it provides it also enables a criminal activity. Sadly, this is true of most technology throughout human history: it is a double-edged sword.


Perhaps the most important takeaway from this Deep Web primer is to remember that is exactly that – a primer. Tor is simply a subsection of a truly massive amount of information that exists and is growing beneath the surface level web as we know it. Exploring this subsection is completely optional, but recognizing its existence is mandatory for anyone who wants to maintain comprehensive digital security. Utilizing the benefits of Tor can also allow one to browse the surface web in anonymity and maintain their personal privacy; and, yet, it is really only one of many ways to do so.


As the ocean of our Internet continues to grow, so will opportunities to connect to new people, be they friendly, malicious, or neutral. Regardless, new territories call for new language, and we hope that at the very least you can now understand what people mean when they use the terms Deep Web and Tor. A connected world should be a Malware-Free World, and knowledge of that world is half the battle.


As for you brave explorers ready to dive deep into the heart of the onion…Bon voyage!





Exploring Uncharted Waters: The Deep Web and Tor

Stir, A Kinetic Desk Startup From An Ex-Apple Engineer, Raises $1.5M Led By Tony Hsieh’s Vegas TechFund

As the world continues to see more and more everyday objects become “hardware” controlled through operating systems and internet connectivity, an ex-Apple engineer called JP Labrosse is hoping to take that principle and combine it with elegant design to transform the prosaic world of office desks. Read More



Stir, A Kinetic Desk Startup From An Ex-Apple Engineer, Raises $1.5M Led By Tony Hsieh’s Vegas TechFund

Stir, A Kinetic Desk Startup From An Ex-Apple Engineer, Raises $1.5M Led By Tony Hsieh’s Vegas TechFund

As the world continues to see more and more everyday objects become “hardware” controlled through operating systems and internet connectivity, an ex-Apple engineer called JP Labrosse is hoping to take that principle and combine it with elegant design to transform the prosaic world of office desks. Read More



Stir, A Kinetic Desk Startup From An Ex-Apple Engineer, Raises $1.5M Led By Tony Hsieh’s Vegas TechFund

Quip, Ex-FB CTO Bret Taylor’s Word Processing App, Gets A Like Button, Themes And More

When Bret Taylor, the ex-CTO of Facebook, co-founded mobile-first word processing app Quip with ex-Googler Kevin Gibbs, the move appeared to be a world away from the work Taylor had done to help build the world’s largest social network. But today, Taylor’s old and new worlds are getting a bit closer, as Quip unveils an update (1.7) with new social features: a like button, comments and themes. Read More



Quip, Ex-FB CTO Bret Taylor’s Word Processing App, Gets A Like Button, Themes And More

MachineShop Comes Out Of Stealth With $3M Funding From Customers To Offer Middleware For Internet Of Services

In a world where everything from sensors in your shoe, to refrigerators, television and jet engines are going to be connected on the web to create the Internet of Things, there are many opportunities to help companies deliver focused services. One of the biggest opportunities is to enable the Internet of Services, which will allow tens of billions of devices connected on the web communicate with… Read More



MachineShop Comes Out Of Stealth With $3M Funding From Customers To Offer Middleware For Internet Of Services

Wednesday, March 19, 2014

Rat Warning: WinSpy and GimmeRAT

winspygimmerat


Have you heard of RATs?


No, not rodent variety; we mean Remote Administration Tools. They’re all the rage amongst management teams that need to monitor unproductive workers and people who don’t trust their significant other. They’re also legitimate tools for tech support teams…and a favorite amongst aspiring hackers.


What is a RAT?


A Remote Administration Tool is software that allows another person to remotely access, control, and monitor your computer or mobile device. How is this legal!? Because RATs do actually have legitimate use. RATs allow tech support teams to take remote control of your computer and fix it for you. RATs are also useful for larger companies that need to monitor their employees’ computer usage. Unfortunately, RATs have also been adopted by those who propagate malware, to remotely – and covertly – watch what their victims are doing.


The Latest RAT Breed


Ever vigilant, the folks at FireEye have discovered a new RAT breed, evolved from the legal, proprietary WinSpy software. WinSpy is blatantly marketed as a monitoring software that will let you “Start Spying on any PC or Phone within the Next 5 minutes.” Certainly, this is a RAT that walks the legal line. FireEye has discovered, however, that WinSpy has been combined with a Trojan installer to target financial institutions.


The bait is as age-old as it is simple: a big hunk of cheese a spearphishing email containing either a malicious attachment or link. Opening the attachment or clicking the link will present the victim with a mock-up of some sort of banking document.  At the same time, and in the background,  a covert installation of WinSpy is initiated.


Known Subspecies


SHA1: d4c3fa5fc299efba794cd24b6755f552471144ff

Detected by Emsisoft as: Gen:Variant.Kazy.298844 (B)


SHA1: e4af6f43bce306f566798a47357211359a811faa

Detected by Emsisoft as: Trojan.Generic.KDV.538313 (B)


SHA1: b04ef81e15182dd6eccf8c5f5bc20df4f0a72d04

Detected by Emsisoft as: Trojan.Generic.4055500 (B)


SHA1: 26ad4939383129965bfd6b627f09dffebeaa0788

Detected by Emsisoft as: Trojan.Generic.2714998 (B)


SHA1: 5ef2096d062dcc99d14ae517e1739f3c2dce2452

Detected by Emsisoft as: Dropped:Backdoor.Generic.226706 (B)


WinSpy Capabilities


This current attack specifically targets employees of banks and financial institutions, to place a copy of WinSpy on their work computer. Once installed, WinSpy can allow the attacker to perform a number of malicious actions, including: screen capturing, keylogging, webcam and microphone monitoring, email exfiltration, and even deactivation of antivirus software. Notably, attackers may also use WinSpy’s server as an intermediary Command and Control to hide their identity.


Those employed in the financial sector have been targeted for obvious reasons: their computers contain the financial information of multiple customers. The RAT-Trojan install combo is by no means a new approach to malware, though, and individual users – regardless of occupation – should beware.


For thorough RAT prevention Emsisoft recommends:


GimmeRat for Android Monitoring


Most interestingly, FireEye’s research into this latest deployment of WinSpy has also revealed components that enable Android monitoring capabilities, such as screen capturing, GPS tracking, and SMS message monitoring. FireEye has named the components that enable these capabilities GimmeRat, as many of the CnC commands these components utilize are SMS texts, like “gmyl,” which stands for Give Me Your Location.


GimmeRat comes in 3 varieties, one of which depends on a physical install and allows monitoring/control via remote computer. The other 2 varieties can be installed remotely and allow for monitoring/control via Android device. All 3 varieties can be used for malicious purposes, and all 3 highlight the growing trend towards mobile malware. Like many malware authors, those behind GimmeRat have clearly recognized that more people are using mobile devices than use computers. As a result, efforts to “build a better mobile RAT trap” have a higher chance of paying off.


For more on GimmeRat and the latest malicious deployment of WinSpy modules, look no further than FireEye’s blog.


In the meantime, Have a Great (RAT-Free) Day!




Rat Warning: WinSpy and GimmeRAT

Ezetap Gets Additional Funding From Amex To Expand Its Mobile Payment Platform Across Emerging Markets

Ezetap, a Bangalore-based mobile payment startup that uses a rectangular device to turn any mobile phone into a point-of-sales terminal when plugged in, is raising additional funding from American Express. Last month, the startup had raised $8 million in Series B funding led by Helion Advisors, Social+Capital and Berggruen Holdings. “The investment will allow us to turn on additional… Read More



Ezetap Gets Additional Funding From Amex To Expand Its Mobile Payment Platform Across Emerging Markets

LeanData Raises $5.1M In Series A From Shasta Ventures To Help Customers Make Sense Of Salesforce Data

Marketeers are often struggling to sift through available customer databases and identify customer leads that can be converted into revenue opportunities. While large enterprises treat this as a big data problem that involves analyzing terabytes of data sets to make business sense, small and medium businesses are always seeking leaner ways to tackle this challenge. LeanData, a startup that helps… Read More



LeanData Raises $5.1M In Series A From Shasta Ventures To Help Customers Make Sense Of Salesforce Data

Parchment Raises $10M To Accelerate Development Of Application Analytics Tools For Students

Parchment, a startup which has taken the offline, aging process of getting and sharing academic and other credentials online, today announced a $10 million round of follow-on funding, bringing its total investment to date to $45 million. The new round is led by The Raine Group, and includes the company’s previous investors, and will be used to bring on new talent and to build new product,… Read More



Parchment Raises $10M To Accelerate Development Of Application Analytics Tools For Students

Invenias, A Cloud Software Provider For Exec Recruitment, Tops Up Its Series A With Another $2M

Invenias, a U.K.-headquarted company that sells cloud software for the executive search and recruitment sector and has an interface that works within Microsoft Outlook, has topped up its funding with a $2 million expansion round from a prior investor. Last July Invenias closed a $1.5 million Series A round, from then-new investor MMC Ventures, plus a number of private investors, including Mark… Read More



Invenias, A Cloud Software Provider For Exec Recruitment, Tops Up Its Series A With Another $2M

Hublo Is The Web Analytics Tool For The Rest Of Us

Meet Hublo, a recently launched analytics service that is easier to use than your average analytics tool. It works a lot like Mixpanel, KISSmetrics and others, but you don’t have to write a single line of code to make it work. “Hublo is the Mailchimp of analytics,” co-founder and CEO Cyril Gantzer told me. “We turn what was once a very technical field, into a user-friendly… Read More



Hublo Is The Web Analytics Tool For The Rest Of Us

Cloudera Raises $160M From T. Rowe Price, Google Ventures And Michael Dell

Cloudera, the startup that commercially distributes and services Apache Hadoop based data management software and services, has raised $160 million led led by T. Rowe Price, and including an investment by Google Ventures and an affiliate of MSD Capital, L.P., the private investment firm for Michael S. Dell. This brings the company’s total funding to $300 million. Read More



Cloudera Raises $160M From T. Rowe Price, Google Ventures And Michael Dell

Dropbox Opens First NYC Office To Strengthen Sales And Engineering

Dropbox’s business software is ready for a big sales push a it bounds towards an anticipated IPO, so today it announced the opening of a sales and engineering office in New York City. In its first place on the east coast, the cloud storage startup developed at MIT will house ten sales people and two to three engineers in a temporary space near NYU before before growing into a permanent spot. Read More



Dropbox Opens First NYC Office To Strengthen Sales And Engineering

Tuesday, March 18, 2014

Fleep, The Team Messaging App Built & Funded By ‘Skype Mafia’, Adds Mac, Windows And Android Apps

Fleep is adding Android, Mac and Windows to the list of supported platforms for its team-messaging app. Read More



Fleep, The Team Messaging App Built & Funded By ‘Skype Mafia’, Adds Mac, Windows And Android Apps

Fleep, The Team Messaging App Built & Funded By ‘Skype Mafia’, Adds Mac, Windows And Android Apps

Fleep is adding Android, Mac and Windows to the list of supported platforms for its team-messaging app. Read More



Fleep, The Team Messaging App Built & Funded By ‘Skype Mafia’, Adds Mac, Windows And Android Apps

With A Voice Interface API For Any App, Wit.ai Wants To Be The Twilio For Natural Language

Last year, voice technology giant Nuance quietly acquired VirtuOz, a developer of virtual assistants for online sales, marketing and support — a “Siri for the enterprise” that counted with the likes of PayPal and AT&T as customers. Now, Alexandre Lebrun, the founder and CEO of VirtuOz, has taken a dive back into the startup world to launch Wit.ai, a platform and API that will let a developer… Read More



With A Voice Interface API For Any App, Wit.ai Wants To Be The Twilio For Natural Language

With A Voice Interface API For Any App, Wit.ai Wants To Be The Twilio For Natural Language

Last year, voice technology giant Nuance quietly acquired VirtuOz, a developer of virtual assistants for online sales, marketing and support — a “Siri for the enterprise” that counted with the likes of PayPal and AT&T as customers. Now, Alexandre Lebrun, the founder and CEO of VirtuOz, has taken a dive back into the startup world to launch Wit.ai, a platform and API that will let a developer… Read More



With A Voice Interface API For Any App, Wit.ai Wants To Be The Twilio For Natural Language

Gravie Health Insurance Marketplace Raises $10.5 Million Series A From Aberdare Ventures

Today Gravie, a health insurance marketplace competing with the likes of Zenefits, has closed a $10.5 million Series A round led by Aberdare Ventures, with participation from exiting investor FirstMark Capital. This comes six months after Gravie closed a $2.6 million seed round, bringing the company’s total funding to more than $13 million. Gravie is a health insurance marketplace that is… Read More



Gravie Health Insurance Marketplace Raises $10.5 Million Series A From Aberdare Ventures

Gravie Health Insurance Marketplace Raises $10.5 Million Series A From Aberdare Ventures

Today Gravie, a health insurance marketplace competing with the likes of Zenefits, has closed a $10.5 million Series A round led by Aberdare Ventures, with participation from exiting investor FirstMark Capital. This comes six months after Gravie closed a $2.6 million seed round, bringing the company’s total funding to more than $13 million. Gravie is a health insurance marketplace that is… Read More



Gravie Health Insurance Marketplace Raises $10.5 Million Series A From Aberdare Ventures

Another Day, Another EdTech Giant Acquired: Following Renaissance Learning, Education Software Veteran Skillsoft Sells For $2B+

It’s been an active week in the world of education software, with this weekend bringing news of the second big-ticket acquisition of a veteran EdTech company in as many days. Last week, Renaissance Learning, the 29-year-old, Google Capital-backed analytics and assessment giant, was acquired by private equity firm Hellman & Friedman for a hefty $1.1 billion. On the same day, rumors of… Read More



Another Day, Another EdTech Giant Acquired: Following Renaissance Learning, Education Software Veteran Skillsoft Sells For $2B+

Saturday, March 15, 2014

ALERT: Google Drive Phishing Scam

A new phishing scam is circulating one of the more populated regionsgoogle-login

of the web: Google Drive File Sharing.


Drive Scam Play-by-Play


  • The scam is initiated by the standard email request to view a shared document on Drive, with a subject line: Documents.

  • Opening the email reveals a link to what is said to be a “very important document.”

  • Clicking on the link leads users to a fake Google log-in page, which is essentially identical to the real one.

  • The fake log-in page is even hosted on Google and contains SSL certification.

Users who enter their information and “Sign in” are redirected to an actual Google Doc containing irrelevant information.  At the same time, and in the background, the user’s Google log-in credentials are sent to the scammer’s web server.


Drive Scam Consequences


As Google’s actual log-in page makes clear, your log-in credentials provide access to “One Account.  All of Google.”  That means that users fooled by this recent scam provide attackers with access to everything they do on Google.  Gmail, Google+, Google Calendar, Google Play – all of Google indeed.  This consequence highlights the problem with using just one service provider, and thus one username and password, for all of one’s online activities.  Doing so may make things easier for you, but it also makes things easier for the bad guys.


Drive Scam Protection


Emsisoft Anti-Malware’s Surf Protection technology automatically protects users from malicious servers like the one used in this Google Drive scam.  Surf Protection utilizes a built-in list of dangerous websites that is updated in realtime, and it is completely immune to social engineering tactics like fake log-in pages.


If you have recently logged on to Google through a suspicious email request, Emsisoft recommends that you change your Google password immediately.  Even if you haven’t logged on through such an email, it is important to change any account’s password with some regularity.  Passwords are your first line of defense to Internet security, and when they are weak or reused the truth is that they’re not much good at all.


It is also important to remember that any email containing attachments, links, or requests to share files should be carefully examined before you click.  Emails are common vectors for malware, and messages from anyone but trusted co-workers, family members, or friends should automatically raise suspicion.


Have a Great (Malware-Free) Day!




ALERT: Google Drive Phishing Scam

Predicting The Next IPO Wave: The Era Of The Enterprise

Over the last three years, we’ve seen an increasing number of tech IPOs – many from consumer facing companies that we’ve long known were headed for an IPO. I’m talking about Facebook, Twitter, Pandora, Yelp, Groupon, Zynga, etc., which most casual observers could see from a mile away. Markets tend to be swayed by sexy consumer offerings; however, we should be paying close attention to the… Read More



Predicting The Next IPO Wave: The Era Of The Enterprise

Algolia Adds Asian Data Center While Taking Over Search On The Web

Real-time search startup Algolia has been doing very well over the past few weeks. Slowly but surely, its search API is taking over every search engine on your favorite websites. The company also launched a new data center in Asia to improve response times with Asian users. As a reminder, Algolia is a developer-friendly hosted search engine for your website. After adding a few lines of codes,… Read More



Algolia Adds Asian Data Center While Taking Over Search On The Web

India’s TeaBox Raises Seed Funding From Accel To Build An Online Starbucks For Disrupting Global Tea Market

In a world rediscovering its old tea drinking habits, finding a freshly-brewed cup of the hot beverage is still very tough, especially if you are a tea aficionado based in the U.S. or Europe. For the world’s second most popular beverage after water, the distribution and production models are still very ancient, perhaps waiting for their own version of Starbucks to happen. Now TeaBox, a… Read More



India’s TeaBox Raises Seed Funding From Accel To Build An Online Starbucks For Disrupting Global Tea Market

Friday, March 14, 2014

General Colin Powell Joins Salesforce Board Of Directors, As CRM Giant Zeros In On Public Sector

Salesforce today announced an interesting development in its leadership ranks: General Colin Powell is joining its board of directors. He brings the total number of members of the board up to 11. Read More



General Colin Powell Joins Salesforce Board Of Directors, As CRM Giant Zeros In On Public Sector

GLG Share Gives Startups Access To Mentorship Without Trading Equity

Since 1998, the Gerson Lehrman Group has been helping its clients answer their most difficult questions, using an algorithm to choose from more than 350k experts and then facilitating a conversation between clients and counselors. These experts include C-level executives, doctors, scientists, educators, journalists, and anyone else who has fostered a certain level of expertise in various… Read More



GLG Share Gives Startups Access To Mentorship Without Trading Equity

Sosh, An Activity Curator, Flips The Monetization Switch With An Event Ticketing Marketplace

Sosh has been around since 2011 and brought a curated activities concierge to SF, NY, and Seattle for three years. But today, the app that offers up cool things to do is adding a new layer to the platform in the form of the Sosh Marketplace. Looking to finally introduce a revenue stream, Sosh is allowing vendors, merchants and artisans in NY, SF, and Seattle to submit their event ideas to the… Read More



Sosh, An Activity Curator, Flips The Monetization Switch With An Event Ticketing Marketplace

Wednesday, March 12, 2014

WordPress Sites Used for DDOS Attacks

wordpress-blogHere’s an interesting one for you bloggers: Your favorite WordPress pingback feature can be used to carry out DDOS attacks.  This Monday, Internet security company Sucuri published a blog post detailing the technical specifics of a distributed denial of service attack on a client who runs a popular WordPress website.  After a bit of investigation, they found that the site had been incapacitated by “162,000 different and legitimate WordPress sites.”


What is a DDOS?


When you visit a website, you are essentially using your computer to request packets of information from another computer.  The computer that “serves” you those requested info-packets is called the server.  In essence, a distributed denial of service attack, or a DDOS, works by sending a server more requests than it can handle, until it is overwhelmed and breaks down.


Another good way to think about a DDOS attack is to compare it to an overwhelmed waiter at a restaurant.  For most waiters, handling a few tables at once is just fine; but, after a certain point too many customers and too many orders will inevitably overwhelm them.  Like the human brain, a computer can only handle so many tasks at once.   DDOS attacks intentionally take advantage of this limitation to incapacitate servers, and in turn shut down the websites they are serving.  This can be very problematic for owners of large websites that engage in eCommerce because every minute their website is down equates to a minute where they could have made a sale.


The WordPress Vulnerability


The DDOS attack reported by Sucuri leverages WordPress vulnerability CVE-2013-0235, which was first identified in July 2013.  Normally, WordPress pingbacks allow bloggers to generate cross references between websites.  These cross references allow bloggers to give credit where credit is due and also track who is referencing their own website.  All of this requires communication between the servers hosting each website involved and the transmission of data packets.  CVE-2013-0235 allows an attacker to create fake pingbacks from one website to another.   This means that Website A can be remotely commanded to ping Website B for a data packet.  Command Websites C-Z to do the same, and suddenly Website B is getting a lot of requests.  Command 100,000+ Websites to send requests as well, and now Website B is out of commission.


Preventing False Pingbacks


The problem with WordPress pingbacks is that they are vulnerable by design.  In fact, web developers have known that XML-RPC – the technology that allows for pingbacks – has been vulnerable to DDOS attacks for years.  As such, there’s currently a bit of debate over how to resolve the issue.


One potential solution posited by Sucuri is to disable XML-RPC entirely, by inserting a short bit of code into your WordPress website’s theme file.  While this will work, many developers have been quick to point out that it will also remove cross referencing from your blog entirely, which is an essential marketing feature for many business websites.  Many, including WordPress founder Matt Mullenweg himself, have also pointed out that “there are cheaper, easier, and more effective ways to DDOS sites” and that pingback pros far outweigh pingback cons.


The good news is that WordPress is a versatile CMS and that CVE-2013-0235 – and most other bugs – can usually be remedied through custom workarounds implemented by knowledgeable developers.  Accordingly, anyone with questions or concerns about this vulnerability is encouraged to comment below, as this very blog runs on WordPress and is maintained by a talented team.  The XML-RPC debate may be ongoing and officially “unsolved”, but if you’re running a website with WordPress and feel you may be vulnerable, Emsisoft is always here to offer support.


Have a Great (DDOS-Free) Day!




WordPress Sites Used for DDOS Attacks

Naked Videos of Your Facebook Friends – Translation: MALWARE

A new Facebook malware scam uses one of the oldest advertising tricks in the book to infect user’s computers: Sex appeal.  According to initial reports, a series of provocative ads are circulating the social network and spreading malware.  The ads reel users in with promises like “See [Your Friend]’s Naked Video” and “[Your Friend]’s Private Video”, accompanied by actual profile pics.


How It Works



    1. You log onto Facebook, and an ad pops up.  It says something like “See [Your Friend]’s Naked Video” or “[Your Friend]’s Private Video.”  Ads also feature real profile pics from actual friends.

    2. Users who click on the ad are led to a fake Youtube webpage.  The page contains a warning about Adult Content and asks for age verification.  Meanwhile, an automatic, drive-by malware download begins.

    3. The downloaded malware is a malicious browser extension.  Once installed, it proceeds to hijack your Facebook account, accessing photographs and automatically creating a new “See [Your Friend]’s Naked Video” ad with your name and face.

    4. After verifying your age, the supposed video initiates – only to display a broken Adobe Flash notification.  Once again, this notification is a fraud.  Users who click UPDATE will initiate a second malware download, which can infect the computer with various types of spyware.


Preventing Infection: Cover Up with Emsisoft


Emsisoft Anti-Malware prevents both strains of malware involved in this scam as Trojan.FakeFlash.A.  Reports have also indicated that up to date versions of Firefox and Google Chrome will prevent infection of the malware involved in Step 3 above, but not Step 4.


Reports have also indicated that the Naked Friend Facebook Scam has already affected 2 million users.  No doubt part of this propagation has something to do with the scam’s worm-like component (Step 3), but social engineering also plays its part.  Internet scams tend to work best when they tempt the user to do something they know they shouldn’t, and naked is just one of those words that makes us click. 


More coverage on this emerging threat is sure to follow as soon as more technical details are revealed.  In the meantime, Have a Great (Malware-Free) Day!






Naked Videos of Your Facebook Friends – Translation: MALWARE

Priceline Buys Israel’s Qlika For $15-20M To Boost Global Expansion With Rocket Science-Powered Ad Tech

Qlika launched out of UpWest’s fourth batch of Israeli-American startups in March to tackle a big problem in online marketing: Localization. In other words, what’s the point of spending millions of dollars on marketing campaigns — across search, social and display — if those campaigns look exactly the same in California as they do in Sydney? Ideally, with conversion rates… Read More



Priceline Buys Israel’s Qlika For $15-20M To Boost Global Expansion With Rocket Science-Powered Ad Tech

Tuesday, March 11, 2014

Emsisoft Mobile Security 1.0 released!

Emsisoft Mobile Security is our company’s first response to the world of mobile malware. It has been designed to help you have a safer and more informed Android experience, and to protect your personal privacy from all of the dangers waiting on the web.


Emsisoft Mobile Security…



  • Scans all stored files for malware infections.

  • Provides real time protection that blocks malicious apps as they arrive.

  • Utilizes surf protection technology that blocks access to dangerous websites.

  • Includes a privacy audit for installed apps.

  • Is designed for maximum efficiency, with little (to zero) system and battery impact.

  • Comes standard with Anti-Theft, to lock or wipe your device remotely if it is stolen.



You can find Emsisoft Mobile Security at the Google Play Store (search for “Emsisoft”) or download the APK from the official product page and test it 30 days for free.


System requirements: Android 2.0.1 or higher
Available languages: English, German, French, Italian, Spanish, Romanian, Portuguese



Why We Created Emsisoft Mobile Security


You’re Unprotected


Practically nobody uses mobile security software. This is a perfect storm environment for financially motivated hackers. The barriers to entry are extremely low, and propagation is a cinch. Just about anyone who knows how to write a computer virus can write one for the mobile world. Although most malicious apps are distributed through alternative app stores, developers need only a valid Google account, $25 and a credit card to publish on Google Play, too.


It’s a Fact


Mobile devices are malware money-makers. 



  • From 2012 to 2013 the amount of known mobile malware threats increased by 614%.

  • Between 92-99% of this increase targeted the Android operating system.

  • According to Juniper Networks, there are more than 500 third-party app stores peddling malicious apps; similarly, in 2013 AV-Comparatives found 7,000 malicious apps in just 20 third-party Android stores.



It’s a Personal Threat


Mobile malware is more than just a numbers game – mobile devices are the tools we use to organize our mobile lives. When these tools are hacked, they can be reprogrammed to act just like an infected PC. Mobile devices are different than PCs, though. Mobile devices are intimately connected to almost everything we do. Mobile devices follow us. We keep them in our pockets and our purses. They guide us, entertain us, and connect us – no matter where we are or who we’re with.


Mobile devices are part of us, and when they are attacked it’s personal.



What Can Happen


Q:


22% of the world’s population owns a smartphone or mobile device. 20% owns a computer. If you were creating malware, and wanted to infect as many people as you possibly could, which platform would you choose?


A:


Mobile Malware


While an extra 2% might not seem like much, it would actually give you access to an additional


140 million devices. Furthermore, it’s been shown that SMS messaging fraud – the most prevalent type of mobile malware attack– generates around $10/per infection, immediately. That’s a potential 1.4 billion dollars in additional revenue.




  • SMS messaging Trojans comprise 73% of all mobile attacks. These attacks hide behind seemingly legitimate apps, which then connect your device to a premium SMS messaging service owned by the attacker. Your device is hijacked, programmed to send texts to a premium rate phone number, and you foot the bill.


  • Mobile rootkits log keystrokes to steal usernames and passwords, and then share your personal information with a remote server. Rootkits can also log and share your current location, and monitor your phone calls and texts.


  • Mobile botnets can control thousands of devices at once for nefarious purposes. Remember: more people own mobile devices than own PCs.


  • Nearly 1/3 of free mobile apps have permission to track your location, malicious or not.



140311-intro-offer_en


Our vision is a Malware-Free World. The world has gone mobile, and now the threats are going there too. That means the world needs mobile anti-malware. And that’s why we’ve created Emsisoft Mobile Security, for you.




Emsisoft Mobile Security 1.0 released!

McAfee: Cybercrime-As-A-Service Led To Credit Card Breach, While Mobile “Malware Zoo” Grew 197% In Q4

It looks like the rise of the “as a service” model, where people can buy software, platform access, security and more from a cloud-based provider for a fixed term, may have spawned its Damien: cybercrime as a service. The latest report from McAfee notes that the rush of point-of-sale credit card breaches that hit consumers in Q4 of last year — most notably at Target but other retailers as well –… Read More



McAfee: Cybercrime-As-A-Service Led To Credit Card Breach, While Mobile “Malware Zoo” Grew 197% In Q4

Monday, March 10, 2014

Ahead Of Build, Tastes Of Microsoft’s Coming Platform Changes

Microsoft’s Build developer conference kicks off in a month, making it not surprising that we’re seeing increasing leaks and noise regarding platform changes the company is working on that may be unveiled at the shindig. Over the past few days, the Windows Phone app emulator has caused chatter due to an uncovered reference to Windows Phone 8.5. Well, of course Microsoft is working on… Read More



Ahead Of Build, Tastes Of Microsoft’s Coming Platform Changes

Friday, March 7, 2014

Application Vulnerabilities? Put Your Computer on the Emsisoft Diet

vulnerableYou are what you eat.  The same goes for your computer.  Feed it junk and it will start to decay.  Feed it its fruits and vegetables, along with a low-impact anti-malware and you can bet it will have a long life ahead.  Unless of course you spill soda on the keyboard.


By now it’s pretty obvious that the Internet is riddled with all sorts of third-party freeware and that downloading too much of it is like eating pizza topped with bacon.  Yes, it tastes good.  Damn good.  But eventually, it’s going to slow you down.  Most of us have known this about computers for some time, and those of us interested in computer longevity remain stalwart against over consumption.


A new study from Denmark-based Secunia Security has brought attention to an oft overlooked component of computer health, however.  It’s not over consumption, but rather vulnerability, stemming from the world’s most popular applications.


Vulnerabilities Defined


Another mantra to consider: You are only as strong as your weakest link.  When it comes to computer security, this one pretty much nails it on the head.  You probably fill your computer with applications – legitimate tools – that are known and trusted.  You do this because they work well and some of them even taste pretty good; but, beneath the surface, many of these tools have vulnerabilities that are just waiting to be exploited.


A vulnerability is a kink – something like an Achilles heel.  It’s a small chunk of incorrectly written code that, if identified by an attacker, could completely compromise your system’s security.  Think of it this way: an application is just a set of instructions that tells your computer to perform certain tasks.  If that set of instructions is vulnerable, it means that it can be altered to make your computer do malicious things or to allow an attacker to access your files.  Vulnerabilities are actually quite common, because the most popular and powerful computer applications contain sprawling amounts of code.  This code changes with each new version released to provide new functionalities but also new opportunities for a vulnerability to arise.


The more popular an application, the more likely it is to be targeted by an attacker.  If, for example, an attacker can identify and exploit a vulnerability within an application used by 50% of the world’s computers…well, that attacker stands to infect and profit of off a whole lot of computers – at least until the vulnerability is patched.  A patch is a chunk of code that repairs an application’s vulnerability.  Patches are released: a) to prevent an attack when a company identifies a vulnerability on its own and b) to remediate an attack when a hacker finds a vulnerability first.  B) is called a zero-day, and it is much, much worse.


The 2014 Secunia Vulnerability Review


As you might imagine, vulnerabilities are a big deal.  Most major software developers automatically patch and update their products on a continual basis, but no system is perfect.  As such, Secunia Security develops a product called Secunia Personal Software Inspector (PSI) designed to detect vulnerable and outdated applications automatically.


PSI does a good job of keeping users up to date, so long as patches exist.  Since it is in widespread use, the software also allows Secunia to conduct studies on the nature of application vulnerabilities.  The most recent study presents key findings from 2013, but also evaluates trends from the last 5 years.


Secunia Vulnerability Review Findings


2014’s report is the result of scanning millions of private computers running Secunia PSI.  The aggregated data was anonymized and used to assess vulnerabilities on the average user’s computer.


Secunia found that in 2013:



  • The average computer had 75 programs installed on it.

  • 50 of these programs (the “Top 50″) were common to all users; 33 were Microsoft products; 17 were third-party products.

  • Third-party products contained 75.7% of the vulnerabilities found within the “Top 50″ programs; Microsoft products were responsible for the remaining 24.3%.


Secunia also found that in 2013:



  • 86.1% of vulnerabilities within the “Top 50″ programs had a patch available on the day of disclosure.

  • Internet Explorer – holding 99% of the web browser market share – had 126 vulnerabilities and 12% of users running unpatched versions of the software.

  • Adobe Reader – holding 91% of the PDF reader market share – had 67 vulnerabilities and 31% of users running unpatched versions of the software.

  • Windows 8 had a total of 1261 vulnerabilities; 55 of these came from Internet Explorer integrated with Adobe Flash.


Important Conclusions


Third-party programs are the most vulnerable. Over the last 5 years these programs have comprised the minority of Top 50 programs, but are still responsible for approximately 75% of all observed vulnerabilities.  Top offenders include products from Adobe, Oracle, Mozilla, and Google.


13.9% of vulnerabilities in 2013’s Top 50 programs went unpatched for over a day. The good news is that this number has decreased over the last 5 years.  The bad news is that even the most stringent patch management will not completely protect your computer.  A user or administrator may indeed identify a vulnerability the day it is announced, but if a patch has yet to be released their computer(s) will still be vulnerable.


A Recipe for Vulnerability Protection: The Emsisoft Diet


In reality, nobody has the time to monitor all of their computer’s applications for vulnerabilities.  Kind of like nobody has the willpower to eat nothing but hard-boiled eggs and grapefruit for breakfast, lunch, and dinner, every single day.  Studies like Secunia’s reveal that computer security reality is far from ideal, but they do not imply user powerlessness.  There are actually a number of things you can do to protect yourself from application vulnerabilities.




  1. If you don’t need it, take it off your computer – because if you are not using it, chances are very high that it is not up to date.


  2. If you do need it, keep it updated.  Microsoft products usually update automatically or at least let you know that updates are available.  Third-party products aren’t always so automated, and might require you to check in at the company’s official website.  Emsisoft works hard to notify our users of most major vulnerabilities through our blog.


  3. Consider using a vulnerability monitor, like Secunia PSI.


  4. Combine items 1-3 with Emsisoft Anti-Malware, and enjoy.  In the event your computer falls prey to an application vulnerability, Emsisoft Anti-Malware will prevent the attack from running to completion using Behavior Blocking technology.


With proper maintenance, your computer can last for many years.  Most users are aware of the fact that too many applications can negatively impact computer performance, but Secunia’s study serves as an important reminder that everyday tools can negatively impact your personal security.  There is a big difference between a sluggish PC that won’t stream your favorite videos and an infected PC that streams videos of your daily activity to hackers with malicious intent.  Here at Emsisoft, we try to prevent both.


So keep an eye on those third-party applications, eat your vegetables, and Have a Great (Malware-Free) Day!


About Secunia


Secunia is recognized industry-wide as a pioneer and global player within the IT security ecosystem, in the niche of Vulnerability Management. They equip corporate and private customers worldwide with Vulnerability Intelligence, Vulnerability Assessment, and automated Patch Management tools to manage and control vulnerabilities across their networks and endpoints.


Full report available for download at:
http://secunia.com/vulnerability-review/




Application Vulnerabilities? Put Your Computer on the Emsisoft Diet

Workable Raises $1.5M From Greylock IL To Build Cloud-Based Recruitment Software For SMEs

Workable, a startup founded in Athens, Greece, that has developed a cloud-based recruitment platform for SMEs, has today confirmed a new investment of $1.5 million led by Greylock IL, the Israel/UK-based affiliate of Greylock Partners, an early investor in LinkedIn which now counts LinkedIn co-founder Reid Hoffman as a partner. Previously, Workable had raised some $950,000 from individuals and the… Read More



Workable Raises $1.5M From Greylock IL To Build Cloud-Based Recruitment Software For SMEs

Emotient Raises $6M For Facial Expression Recognition Tech, Debuts Google Glass Sentiment Analysis App

Emotient, a startup based out of San Diego that works in the emerging area of facial expression recognition, is today announcing a $6 million round of funding and its first steps into applying its technology in the wearables market: a new piece of “glassware” for Google Glass that measures sentiment analysis based on reading people through the headgear’s camera. Read More



Emotient Raises $6M For Facial Expression Recognition Tech, Debuts Google Glass Sentiment Analysis App

Wednesday, March 5, 2014

GuideSpark Raises $15M To Become Your One-Stop HR Training Resource

Menlo Park-based startup GuideSpark has raised a new $15 million Series B from NEA, as well as existing investors Storm Ventures and IDG Ventures. GuideSpark previously raised $5 million in a Series A round, and offers companies SaaS applications and eLearning content aimed at streamlining an organization’s HR processes, and bringing them out of paper resources and online. “We’re… Read More



GuideSpark Raises $15M To Become Your One-Stop HR Training Resource

CloudBees Raises $11.2M Series C Led By Verizon Ventures To Expand Its Java-Centric Enterprise PaaS

CloudBees, a Java-centric Enterprise platform as a service we’ve covered a few times in the past, today announced that it has raised an $11.2 million Series C funding round led by Verizon Ventures. Existing investors Matrix Partners and Lightspeed Ventures also participated in this round, as well as new investor Blue Cloud Ventures. In total, the service has now raised $25.7 million since it… Read More



CloudBees Raises $11.2M Series C Led By Verizon Ventures To Expand Its Java-Centric Enterprise PaaS

Zoho Seeks To Disrupt IT Helpdesk Market By Offering ServiceDesk For Free

With enterprises looking to achieve cost savings as their top priority in managing their IT systems, the IT help desk market is getting commoditized very fast, leaving little room for any disruptive innovation. ManageEngine, a division of Zoho, is offering its flagship IT help desk software — ServiceDesk — for free starting today, underscoring just how competitive and commoditized this… Read More



Zoho Seeks To Disrupt IT Helpdesk Market By Offering ServiceDesk For Free

Tuesday, March 4, 2014

Emsisoft Alert: Netflix Tech Support Scam

netflix


Netflix users, beware: a new tech support scam uses the popular media streaming service to steal your identity for the low, low cost of $389.97.  The scam was discovered February 28th, by security researcher Jerome Segura.  Segura entered the scam through a Netflix phishing site, Netflix.afta3.com.  Knowing full well what he was getting himself into, Segura played along and let the scam run its course.  What he found was a novel and surprisingly comprehensive way of stealing your identity.


Your Account Has Been Hacked, Let Us Fix It…By Hacking It


Step 1: Phishing

Netflix.afta3.com is a phishing site.  A phishing site is a website created to steal visitor’s information. Netflix.afta3.com does so by modeling itself after the legitimate Netflix member sign-in page.  You give the phishing site your username and password, and the phishing site sends them to its nefarious master.


Step 2: Social Engineering

Netflix.afta3.com tells you it has suspended your Netflix account.  Another well-crafted Netflix mock-up page pops up saying “We have detected unusual activity on your account.”  To unlock your account, you’re told you’ll have to call a 1-800 number.  An error code is also supplied for your reference.  This is social engineering: scare the user into thinking something is wrong and then supply them with a solution.


Step 3: Rogue Support

We usually use the term rogue to refer to a Trojan malware that pretends to be an antivirus software.  Such software will “scan” your computer, “find” a bunch of infections, and then demand payment to “remove” them.  In Step 3 of the Netflix tech support scam, you are connected to a real-live “tech support representative.”  Like a Trojan rogue, he will very seriously tell you that your account has been hacked and that the only way to fix it is with his team’s help – which, of course, doesn’t come cheap.


Step 4: Netflix Support Software

After chatting with your rogue support rep, he’ll tell you that you need to download the Netflix Support Software.  What he really means is TeamViewer, a software that will allow his team to remotely access and control your computer.


Step 5: Smoke and Mirrors

During Step 5, the tech support scammer basically just talks to you on the phone while his associates use TeamViewer to rifle through your computer’s files and steal the good stuff.  You’ll be told that someone hacked your computer and used it for illegal activities, and you’ll be shown an official looking Windows Batch Script that displays foreign infiltrations from countries like Serbia and China.  Meanwhile, any files connected to your identity or finances will be stolen.


Step 6: Payment

After a bit of yammering, your tech support representative will tell you that the only way to fix your computer is to purchase help from a Microsoft Certified Technician.  The cost?  “Usually $439.97, but since we’re such great guys we’ll give you a $50 discount, bringing your grand total to $389.97!”  (Note: People who throw the word Certified around are usually less than decent human beings.) 


Step 7: To Ensure You’re Not Scamming Us

Finally, those who wish to purchase help will need more than just a credit card number.  To ensure that you’re not scamming them (!) the Netflix tech support representative will request photographs of your credit card and your photo ID.  If you can’t supply this documentation, the tech support team will gladly activate your webcam (using TeamViewer) and take the snapshots for you.


How to Avoid This Scam


Segura’s research has linked this novel combination of scamming techniques to a newly registered website, camlesh.biz, with an Indian IP address.  Accordingly, the rogue tech support rep was not a native English speaker.


If you’re reading this blog post, chances are pretty high that you’re immune to this type of attack.  While it may combine traditional scamming methods in a novel way, the truth is that it simply contains way too many red flags to fool the average Internet literate user.


The scam does, however, pose a great risk to users who don’t much about computers.  In particular, many children/grandchildren who may have introduced their parents/grandparents to the wonders of Netflix would do well to warn their elders of this threat.  In general, phishing and social engineering scams like this one are most effective against the least informed.


If you know someone who could be targeted by this new attack, we’d ask that you spread the word.  Share this article, or better yet help them learn about Identity Theft in general.  Our knowledge base articles Hacking Identity Theft I and II were written expressly for this purpose.  Send them a link, or better yet print it out and hand it to them.   


Another simple solution would be to install Emsisoft Anti-Malware on their computer.  Our software features Surf Protection technology, which automatically prevents users from visiting phishing sites like Netflix.afta3.com.  We update our blacklist once every hour, to protect our users from the latest threats – meaning you don’t have to call up Uncle Bob every time a new phishing scam emerges.  And, hey, if you put it on your computer, you won’t have to worry about being scammed either.


Here’s to a Great (Malware-Free) Week Ahead!




Emsisoft Alert: Netflix Tech Support Scam