PC Tools Lists Top Internet Blunders of 2008
Consumer Security Vendor Ranks Top Five Blunders and Looks Ahead to What May Cause Blunders in 2009
San Francisco, December 22, 2008: Leading security software vendor, PC Tools, today released a list of Top 5 Internet Blunders of 2008, and a list of the types of Internet threats expected to play a role in the Blunders of 2009.
“As online threats evolve and become increasingly sophisticated and dangerous, security software vendors must apply increasingly advanced techniques to provide consumers comprehensive protection” said Michael Greene, VP of Product Strategy. “PC Tools’ security products offer behavioral-based technology, which has the ability to provide protection against both known and unknown online threats” said Greene.
PC Tools reflects on security headlines for 2008 and counts down the top 5 online attacks, listing their picks for the Top Internet Blunders of 2008:
5. Hackers breach Epilepsy Website
Landover, Maryland -- March 22, 2008: Pranksters breached the Epilepsy Foundation’s website, with those behind the cyber break-in posting hundreds of links to pages with flashing images. Those who suffer from photosensitive epilepsy are vulnerable to visually-stimulated seizures, and the videos and images triggered near-seizure reactions in some visitors
4. NASA Announces Laptops Infected by Malware
International Space Station -- August 27, 2008: NASA made public the knowledge that laptops aboard the International Space Station carried malware commonly used to steal passwords from online gamers. The laptops were originally infected in July, and reports released by NASA show this was not the first Internet security risk to be found on board the Station. No damage was done to NASA’s command center, as the infected laptops were not connected to that network
3. “Black Hole” Experiment Hacked
Geneva, Switzerland -- September 13, 2008: Portions of the computer network used by CERN’s Large Hadron Collider (LHC) were allegedly hacked by a group named the "Greek Security Team.” The Greek Security Team allegedly posted messages to the facilities’ website mocking the network’s security procedures. (CERN, European Organization for Nuclear Research is using the LHC to study the science behind gravity, dark matter and dark energy, and the possibility of extra dimensions in our Universe, among other hypotheses)
2. High-profile Hacking targets celebrities
Murfreesboro, Tennessee – July 12, 2008: A 19-year-old hacker allegedly breached teen pop star Miley Cyrus’ Gmail account, posting her racy personal photos online and offering interviews to publicize his break-in expertise. To date, no criminal charges have been filed.
Knoxville, Tennessee – September 17, 2008: A 20-year-old hacker allegedly used Yahoo’s password recovery tool to gain access to Vice Presidential nominee Sarah Palin’s personal email account, allegedly posting screen shots of emails, her contact list, and family photos publicly. The U.S. Attorney’s office is currently investigating the offense.
1. Internet Infrastructure Flaw Discovered
Seattle, Washington -- August 7, 2008: A security consultant and researcher of IOActive discovered a major flaw in the Internet’s core infrastructure, which allowed hackers to re-route users to fraudulent websites, as well as intercept emails that could potentially hold personal information. The vulnerability was found in a network of servers called Domain Name System (DNS). Microsoft, Cisco Systems, and others were forced to issue software patches
PC Tools is expecting threats and hoaxes targeting those most affected by the economic crisis in 2009. PC Tools also expects to see Clickjacking (a technique in which cyber criminals “hijack” a users online ID by means of collecting innocent data) play a more prominent role in the coming year, while socially engineered threats and rogueware will continue to be a significant risk in the New Year.
PC Tools advise consumers to seek comprehensive security protection to help protect against these types of threats.
“The most important thing users can do is use advanced behavioral-based security software to ensure optimal protection,” concluded Greene. “Built on the award-winning ThreatFire, Behavior Guard is seamlessly incorporated into Internet Security 2009 and is available as an optional add-on for Spyware Doctor with AntiVirus, offering an unparalleled level of security.”
ABOUT PC TOOLS
PC Tools offers leading security and utility products, including the multi award-winning Spyware Doctor®. PC Tools is an industry leader in real-time anti-spyware and has a number of key patents pending. The PC Tools Malware Research Center monitors trends and emerging spyware issues and provides security solutions for the consumer and enterprise marketplace.
PC Tools has offices in Sydney, San Francisco, London, Shannon (Ireland), Melbourne, Kiev, and Boulder. PC Tools has a global network of distributors, resellers, and retailers.
Public Relations Manager
PC Tools Software
Phone: +61 (0) 2 8922 6394
Mobile: +61 410 541 562