About
Subscribe

Storm rages the world

The war on the Storm worm is far from over, as its writers continue to change their tactics over time.
By Ilva Pieterse, ITWeb contributor
Johannesburg, 31 Aug 2007

The war on the Storm worm is far from over, as its writers continue to change their tactics over time, according to The Register.

Storm worm authors are now using YouTube to propagate their malicious deeds. This dreadful malicious virus sees writers sending out e-mails punting their malware via fake YouTube links.

The links, once clicked, send unsuspecting victims to a malware-loaded Web site designed to turn PCs into a spam-spewing zombies.

Be on the lookout for text such as 'dude don't send that stuff to my home e-mail...', 'LMAO, your crazy man,' and 'OMG what are you thinking,' in the message body of e-mails.

Storming the castle

The site also tells us this is not the Storm gang's only trick. It seems they have taken a liking to Blogger.com, plastering its pages with enticing messages that lure users into clicking through to toxic Web sites.

The latest iPhone debacle has led to the constantly harassed iPhone being unlocked by two separate entities - a New Jersey teenager named George Hotz, and a commercial group.

This latest unlocking spree allows the device to connect to other carriers, according to SecurityFocus.

To be a hacker

iPhone unlocked

Ilva Pieterse, ITWeb contributor

The 17-year-old Hotz has not been duly punished for his wily efforts, but has rather been hired by a business tycoon and furnished with a sports and a consulting job, says Seacoast Online.

Terry Daidone, business tycoon and co-founder of CertiCell, struck the deal this week with the teenager.

Hotz sparked a media and tech-world frenzy last week when he became the first person to hack and "unlock" his Apple iPhone, releasing it from its current restriction to a single carrier, AT&T.

Sony, so no

Also now open to hackers is one of Sony's memory stick software. According to Connected-Home-News, F-Secure has reported a potential flaw that leaves PCs vulnerable to remote hackers.

The potential weak spot is related to techniques used by the software bundled with Sony MicroVault USB sticks to cloak sensitive files.

The software creates a hidden directory on a computer's hard drive that could allow a hacker to infect the computer. Any files stored on the hidden directory would be invisible not only to the user, but also to some virus scanners and security software.

Share