« Mac Safari Browser | Main | Mozilla Firefox »

Tuesday, April 14, 2009

Twitter Awareness

The recent cross-scripting attack on the newest buzzword universe called Twitter is merely another bump on the rocky road through Interpipe 2.0

These XSS attacks are the bane of Web 2.0 and will cause disasters for individuals who refuse to become aware of their online surroundings. Compound this with users who remain clueless about what is running on their PC's and you have a large impediment in the push through to Web 3.0 applications.

Now add smartphones and netbooks to the mix ;(

For a fine write up on the Twitter XSS attack see: http://twittercism.com/protect-yourself-on-twitter/

Be sure to check out the fine tip from Twittercism about XSS busting using Firefox browser with the Add-on NoScript with screencaps from Better Safe Than Sorry here.

Tuesday, January 06, 2009

Phishing Targets Tweeter

The popular mobile service Tweeter has been hit with phishing messages. Nothing new about this. It is a good time to remind folks about the devious nature of these evil doers. Any method will be used to induce the unwary or stupid to visit sites that will attempt to upload all kinds of malware, spyware, trojans, etc. to your PC, smartphone or other device. The vector for this specific attack is the very popular 'TinyURL' online application that turns large, unwieldy URLs such as “http://www.somewhere.orf/really/long/directory/” into something such as “http://tinyurl.com/4d4a2” which can be remembered long enough to key into a browser. The problem is that the TinyURL could lead one to evil sites. Very bad. TinyURL's solution, which folks either don't know about or don't use or understand is to use the Preview TinyURL. In our previous example one should append the TinyURL with preview: “http://preview.tinyurl.com/4d4a2”. This will allow for the best practice of safely viewing a rendering of the intended target before actually visiting it.

Friday, June 29, 2007

iPhone Released

It's from Apple. It's cool. It's got a few neat ideas few of which are truly new. It's joined at the hip with Apple exactly like Microsoft software yet this linkage is muted because, well, with Apple this is a feature. Sure. For business users it holds nothing except promise in that you know version 2.0 will build on the hype (and, by this time, sales) to leveredge Apple into a nice position to take a run at the dying Music Industry.

Thursday, May 24, 2007

Cellphones Disable Nissan Car Keys

If you drive either a 2007 Nissan Altima sedan or a Nissan Infiniti G35 sedan you will want to keep your car keys well away from your cellphone. Reports from Nissan conclude if the keys and cellphone are touching when any incoming or outgoing call is initiated the data on the car keys can be erased. No keys, no entry or ignition! Those of you who don't drive these makes or models would do well to consider the greater significance of two electronic devices colliding. Always be aware of the potential for unexpected results when dealing with the ever present digital geegaws and thingamajigs. NOTE: Contrary to the Heading this is NOT an actual product recall . . . for now.

Wednesday, September 06, 2006

Toronto Wi-Fi Now Available!

Woo hoo!

Wednesday, August 30, 2006

Persistent data indeed

Remember to always wipe the sensitive data from old devices such as cell phones and PDA's before you part with them. The Globe and Mail has the story here.

Friday, April 14, 2006

Kaspersky AV Mobile (BETA)

Kaspersky Labs is offering a BETA version of its Anti-Virus for cell phones using the Symbian OS. Sign up and offer feedback to help improve this application and you may receive a free version of the commercial version.

Tuesday, April 11, 2006

Dude, where are my icons?

After installing todays Microsoft updates confirm your taskbar icons are still visible. If you are a notebook user you may need to see the power meter ;-)

Thursday, March 30, 2006

Flexispy.A Symbian 60 Trojan / Keylogger

This nasty litle piece of work is actually a commercial product named Flexispy! It records information about voice calls and text messaging sessions. The information is sent to a company server where it can be viewed on the web. Now, I can imagine many scenarios where this type of application could be used in a positive manner but lets get realistic and assume it will be used for nefarious purposes. F-Secure has all the details.

Monday, March 06, 2006

Toronto to get Wi-Fi

Accoording to numerous sources the entire city of Toronto will join other hotspots to provide Wi-Fi. Woo-hoo! Wait? What's that sound I hear? Why, it sounds like Ted Rogers upchucking!

Tuesday, February 28, 2006

Java Trojan RedBrowser-A Targets Cell Phones

Evildoers have created a Trojan that targets cell phones running Java. Found by Kaspersky Lab this puppy infects any device capable of running Java applications. The text is only in Russian so far so the chance of running into this outside of that country is small. The threat is that someone may reverse engineer it for other countries so keep on your toes. This Trojan pretends to be a WAP browser offering free browsing via SMS messages. Since many companies the world over offer cheap or free SMS the victim is tricked into believing they are able to browse the Web for free. In reality the trojan sends SMS messages to one specific number that will charge back a premium amount on the victims cell phone bill. Best Practices circa 1878: If it sounds to good to be true it probably is. Best Practices circa 2006: If it sounds to good to be true Google it.

Friday, September 23, 2005

First Symbian Trojan Targeted at the PC

A report from F-Secure details the first known attempt of a virus threat on the PC coming from a mobile phones memory card. While it seems unlikely to cause damage (read why here: http://www.f-secure.com/weblog/#00000659) this is still something to take note of for the future. Remember: Security is an ongoing process - you must be aware at all times of the potential for mischief in seemingly unrelated items. Because, cough, Better Safe Than Sorry, cough.

Saturday, September 17, 2005

Bell & Rogers = Inukshuk

In a bid to stifle any competition where WiFi is concerned, Bell and Rogers have formed a new entity, Inukshuk, to spread a $200,000,000.00 wireless network across Canada. Each partner will be allowed to use 50% of the others network but such items as billing and tech support will remain distinct. How soon until each will overload the others network and blame the problem on their partner has yet to be seen. How soon until tech support and billing issues (neither of which is a strong suit for these companies) are simply blamed on each other is unknown at this time. How long before extra charges, inept installation and all network issues being blamed on each carrier remains to be seen. Watching the canabilization of each companies customer base OR the amazement of the public when the rates for this access are announced should prove highly amusing.
Posted by Matthew Carrick at 1:47.43 PM EDT | Permanent Link
Edited on: Saturday, September 17, 2005 1:58.28 PM EDT
| Categories: Mobile

Tuesday, August 09, 2005

New Symbian Trojan

What would you do if the new application you just copied to your Symbian cell phone caused the fonts to disappear? Well, if you insist on visiting dodgy sites to download pirated software you may son have real world experience on the issue. A new trojan named SymbOS/Blankfont.A is waiting for you at a Warez site now!

Todays lessons learned:
  • Never install an application on any device unless you have searched the Internet and came up blank on horror stories.
  • Do not use pirated software.
  • Stay away from sites that have evil intent or conduct illegal activities.

Tuesday, April 05, 2005

Mabir.A Virus Spread Via SMS & MMS

This virus listens for SMS or MMS message arriving to the phone. When a message arrives, Mabir.A sends itself as an MMS message to the sending phone number, thus posing as a reply to the message that was sent to the infected phone.

This virus also spreads via Bluetooth.
Posted by Matthew Carrick at 11:45.15 AM EDT | Permanent Link
Edited on: Wednesday, July 20, 2005 5:28.11 PM EDT
| Categories: Bluetooth, Mobile, Virus-Trojan-Worm Alerts

Saturday, February 19, 2005

Cabir Mobile Phone Virus Found in US

First it was in the far east now the United States so we can assume it is only going to be a short time before it appears in a Canadian city near you. If your cell phone has Bluetooth then disable it if not using it and if you enable it ensure the setting is in the hidden or un-discovered mode.
Posted by Matthew Carrick at 11:38.43 AM EST | Permanent Link
Edited on: Wednesday, July 20, 2005 5:41.45 PM EDT
| Categories: Mobile, Virus-Trojan-Worm Alerts

Thursday, February 10, 2005

Future Threats

"I won't be in to work today . . . my pacemaker caught a virus from my Bluetooth headphones in my car and when I talk I sound like Ethel Merman on steriods so I, ah . . . gotta reboot."

Ack.
Posted by Matthew Carrick at 5:31.58 PM EST | Permanent Link
Edited on: Wednesday, July 20, 2005 5:43.49 PM EDT
| Categories: Adware/Spyware Alerts, Best Practices, Bluetooth, Mobile, Security Alerts, Technology, Virus-Trojan-Worm Alerts

Thursday, December 30, 2004

New Cabir Variants are Spreading Fast

If the shiny new cell phone you received for X-mas has Bluetooth built in then you should set the phone to be "undiscoverable" to other devices. If you wish to be really safe then also shut off the Bluetooth function until you need it.
Posted by Matthew Carrick at 5:35.09 PM EST | Permanent Link
Edited on: Wednesday, July 20, 2005 6:13.03 PM EDT
| Categories: Best Practices, Bluetooth, Mobile, Virus-Trojan-Worm Alerts

Wednesday, December 15, 2004

Trend Micro Mobile Security


Trend Micro™ Mobile Security is designed to protect data-centric mobile devices such as smartphones against viruses and short message service (SMS) spam. The integrated solution provides automatic, real-time scanning to protect wireless devices against malicious code and viruses on the Web or hidden inside files.

The software is free but expires on 30 June 2005.
Posted by Matthew Carrick at 10:57.46 AM EST | Permanent Link
Edited on: Wednesday, July 20, 2005 6:18.05 PM EDT
| Categories: Mobile, Virus-Trojan-Worm Alerts

Tuesday, November 30, 2004

Skulls Trojan horse carries Cabir.B cellphone worm

Always a good idea to turn off the Bluetooth discovery function on your cell phone unless you are actively seeking a connection - If not, your next connection may be one of these bad guys.
Posted by Matthew Carrick at 7:53.44 AM EST | Permanent Link
Edited on: Wednesday, July 20, 2005 6:55.01 PM EDT
| Categories: Bluetooth, Mobile, Virus-Trojan-Worm Alerts

Thursday, November 25, 2004

Trojan Targets Symbian Handhelds

Symbian 60 users should be aware of a trojan found on shareware download sites named "Extended Theme Manager" by "Tee-222" - DO NOT install this on your phone.
Posted by Matthew Carrick at 12:30.56 PM EST | Permanent Link
Edited on: Wednesday, July 20, 2005 6:55.43 PM EDT
| Categories: Best Practices, Bluetooth, Mobile, Virus-Trojan-Worm Alerts