G. Morgan wrote:
> ~BD~ wrote:
>
>> *Why* haven't you seen the document, Graham?
>
> At the time you posted it I was busy.
Simple as that! Thanks
>> It looks good using Safari, smaller font in Google Chrome though.
>>
>> The content *is* interesting IMO. Did you simply choose not to look?
>
> I looked, even tried to extract the text. I did, but it looks like
> ****.
And yet *you* are the professional! ;-)
Example, FYI ........
Era of Instant Crime
More than anything else, 2010 was distinguished by the full and proper
emergence of toolkits as a means to perpetrate cybercrime. While these
have always been a part of the cybercrime underground, in 2010 they
flourished and became an even bigger part of the overall threat landscape.
Let us take, for example, a typical scenario for malware attacks. Many
systems today are infected when users search for information utilizing
search engines. Sometimes the infection is readily apparent—FAKEAV—at
other times these are silent—banking Trojans. One would think that this
is the work of a skilled hacker but that is not always the case.
Poisoning search engine results—a technique known as blackhat search
engine optimization (SEO)—involves creating Web pages that will be
highly ranked for certain search terms. Doing this manually is tedious
but there are many point-and-click toolkits that automate the whole
process. Tools like XRumer and uMaxSoft Doorway Generator can take
target keywords and can automatically create thousands of the necessary
sites.
Next, a cybercrime gang needs to upload the said pages to sites— either
malicious or compromised. Again, compromising sites one by one is a
tedious process. Toolkits also considerably automate this process,
running the scripts needed to compromise sites en masse. Note that this
process occurs within hours, if not less, after a topic becomes newsworthy.
>
> It was interesting.
>
Phew! That's something, I suppose! <vbg>



Reply With Quote