<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-5444458813582258922</atom:id><lastBuildDate>Thu, 03 Oct 2024 18:13:04 +0000</lastBuildDate><category>botnets</category><category>malware</category><category>scam</category><category>security apps</category><category>web security</category><category>malicious sites</category><category>websense</category><category>banking</category><category>blackhat seo</category><category>blogger</category><category>cybersecurity</category><category>firefox</category><category>fraud</category><category>misc</category><category>phishing</category><category>twitter</category><title>Green Cloud</title><description>Blogs focused on Web Security and Converged Threats</description><link>http://greencloudsecurity.blogspot.com/</link><managingEditor>noreply@blogger.com (Green Cloud Security)</managingEditor><generator>Blogger</generator><openSearch:totalResults>21</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-5565016480640356503</guid><pubDate>Thu, 15 Jul 2010 00:38:00 +0000</pubDate><atom:updated>2010-07-14T17:38:28.692-07:00</atom:updated><title>Symantec: Web Threats 2010</title><atom:summary type="text">Came across this great report on the state of Web Threats this year. One of the key lessons from this report shows how cybercriminals are now focused on compromising existing web servers rather than bringing their own online. In fact, they found 90% of malicious websites are compromised sites.

Key reason for this, as explained by Symantec analyst Dan Bleaken:
The attraction of knowing that </atom:summary><link>http://greencloudsecurity.blogspot.com/2010/07/symantec-web-threats-2010.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-2979454118479598586</guid><pubDate>Sat, 10 Jul 2010 03:43:00 +0000</pubDate><atom:updated>2010-07-09T20:43:31.514-07:00</atom:updated><title>News Storm</title><atom:summary type="text">Here&#39;s some key stories that unfolded this week in security:

YouTube Victim of XSS Attack

On Sunday YouTube fell&amp;nbsp;victim&amp;nbsp;to a XSS attack redirecting users to different sites from fake anti-virus pages to porn to Canadian pharmacy. Google patched up the problem relatively quickly but the backlash on Twitter was tremendous. Here&#39;s some great posts by SecTechno,&amp;nbsp;The Register, and the</atom:summary><link>http://greencloudsecurity.blogspot.com/2010/07/news-storm.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-8876993694215458543</guid><pubDate>Fri, 09 Jul 2010 01:17:00 +0000</pubDate><atom:updated>2010-07-08T18:17:01.607-07:00</atom:updated><title>Global Spam Rate 89.3% According to Latest Symantec Report</title><atom:summary type="text">Symantec recently released their Message Labs Intelligence report, highlighting some key stats in email and web based threats. According to the report the global spam rate is now 89.3%, with 80% of these being pharmaceutical spam. The report also goes into depth on the rash of World Cup threats that amassed in the months before the start of the World Cup.

Check out the full report below...

http</atom:summary><link>http://greencloudsecurity.blogspot.com/2010/07/global-spam-rate-893-according-to.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-3786275149154303425</guid><pubDate>Wed, 07 Jul 2010 02:20:00 +0000</pubDate><atom:updated>2010-07-06T19:20:21.681-07:00</atom:updated><title>Firefox 4 Beta 1 Released!</title><atom:summary type="text">The long awaited Firefox 4 Beta 1 has been released. This includes tons of changes, including tab placement and other enhancements for CSS and HTML5. Download link and release notes are linked below...check it out!

http://www.mozilla.com/en-US/firefox/all-beta.html
http://www.mozilla.com/en-US/firefox/4.0b1/releasenotes/</atom:summary><link>http://greencloudsecurity.blogspot.com/2010/07/firefox-4-beta-1-released.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-1334583551842176284</guid><pubDate>Wed, 07 Jul 2010 02:06:00 +0000</pubDate><atom:updated>2010-07-06T19:06:47.647-07:00</atom:updated><title>Launch Action Still Vulnerable</title><atom:summary type="text">Adobe release a patch last week to finally patch to limit the vulnerable Launch action that could be used to run script from Adobe Reader. Turns out the patch is not really complete and the Bkis Blog&amp;nbsp;has found ways around this.&amp;nbsp;
It took Adobe 3 months to issue a patch for this to begin with, are we going to have to wait another 3 months?
In the meantime Didier Stevens, who originally </atom:summary><link>http://greencloudsecurity.blogspot.com/2010/07/launch-action-still-vulnerable.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-2020046119172762268</guid><pubDate>Fri, 02 Jul 2010 02:30:00 +0000</pubDate><atom:updated>2010-07-01T20:06:19.020-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">blogger</category><category domain="http://www.blogger.com/atom/ns#">twitter</category><title>Adding Twitter Updates with Style</title><atom:summary type="text">Getting back into things, some things just weren&#39;t lining up in the blog template any longer, so we decided to scrap the whole thing and rebuild using the same template. Strangely enough though, the Twitter widget provided by Blogger doesn&#39;t allow any styling, which made the Twitter updates almost impossible to read.

After a while of tinkering with the widgets and trying to find the right one to</atom:summary><link>http://greencloudsecurity.blogspot.com/2010/07/adding-twitter-updates-with-style.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-8475088306840572296</guid><pubDate>Fri, 02 Jul 2010 02:24:00 +0000</pubDate><atom:updated>2010-07-01T20:05:43.633-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">misc</category><title>We&#39;re Back!</title><atom:summary type="text">Green Cloud Security is back after a long layoff, mostly working on other projects. It&#39;s exciting to dig back into the site, and security in general. You can expect more of the same posts, coverage on the latest threats, threat reports, security tips and more.&amp;nbsp;
Have a great day everyone!</atom:summary><link>http://greencloudsecurity.blogspot.com/2010/07/were-back.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-2034350729618710764</guid><pubDate>Wed, 21 Oct 2009 02:51:00 +0000</pubDate><atom:updated>2009-10-20T19:57:57.816-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">banking</category><category domain="http://www.blogger.com/atom/ns#">botnets</category><category domain="http://www.blogger.com/atom/ns#">fraud</category><category domain="http://www.blogger.com/atom/ns#">malware</category><title>Banking and Virus Scanning with a Live CD</title><atom:summary type="text">Last week, Brian Krebs of the Washington Post blogged here advising business owners to perform online banking using a live CD. This excellent advice (IMHO) created quite a stir over the last week.

Essentially, banking on a live CD prevents you from becoming susceptible to Windows viruses, while at the same time loading a fresh, non-compromised OS each time. This can almost guarantee that you </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/banking-and-virus-scanning-with-live-cd.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_rl_V5R5NQtY/St50vJsh3VI/AAAAAAAAAAM/xM6oA6gv60o/s72-c/avast2.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-2156518236720440532</guid><pubDate>Tue, 20 Oct 2009 02:15:00 +0000</pubDate><atom:updated>2009-10-19T19:29:50.318-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cybersecurity</category><title>Obama Stresses Cybersecurity Awareness</title><atom:summary type="text">&quot;The lesson is clear, this cyberthreat is one of the most serious economic and national security challenges we face as a nation&quot; (Obama).

This is the message that Obama recently declared in a short video on the White House website. He makes it very clear, in the midst of cybersecurity awareness month, that all Americans need to be aware and secure in their online activities.

&quot;As consumers we </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/obama-stresses-cybersecurity-awareness.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-7716319231998909082</guid><pubDate>Tue, 20 Oct 2009 00:44:00 +0000</pubDate><atom:updated>2009-10-19T17:52:50.714-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">botnets</category><category domain="http://www.blogger.com/atom/ns#">malicious sites</category><category domain="http://www.blogger.com/atom/ns#">malware</category><category domain="http://www.blogger.com/atom/ns#">scam</category><title>New Zeus Scam Emails and Download Domains</title><atom:summary type="text">There are some new Zeus emails going around that folks should be aware of. These emails, as reported by the Securosis blog, pretend to be from a system administrator. The administrator asks them to &quot;run SSl updates procedure&quot; as below.

Attention!
On October 22, 2009 server upgrade will take place. Due to this the system may be offline for approximately half an hour. The changes will concern </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/new-zeus-scam-emails-and-download.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-3111105159669273181</guid><pubDate>Fri, 16 Oct 2009 01:20:00 +0000</pubDate><atom:updated>2009-10-19T17:48:04.738-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">botnets</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">web security</category><title>New Twist on IRS Spam</title><atom:summary type="text">There is a new twist on the IRS emails that have been delivering zbot and other threats over the last month. In some new emails, reports Gary Warner, the link contained in the message is to Geocities.An example from the CyberCrime &amp;amp; Doing Time blog:hxxp://geocities.com/FreddyCampbell36/ohuloc.htmWhile the users will ultimately end up at the commonly used http://www.irs.gov.blah.blah.co.uk/</atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/new-twist-on-irs-spam.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-5742099044467461525</guid><pubDate>Sat, 10 Oct 2009 14:52:00 +0000</pubDate><atom:updated>2009-10-10T07:53:00.501-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">firefox</category><category domain="http://www.blogger.com/atom/ns#">security apps</category><title>Green Cloud Security Firefox Add-On Collection</title><atom:summary type="text">Firefox recently added the ability to group collections of add-ons for easy sharing. The ISC recently published their recommended add-ons and we&#39;ve followed in suit. There was a couple additional add-ons, namely FlagFox and KeyScrambler, that are also useful security add-ons. 

Green Cloud Security Add-Ons:
https://addons.mozilla.org/en-US/firefox/collection/greencloudsecurity</atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/green-cloud-security-firefox-add-on.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-1672310483475264291</guid><pubDate>Sat, 10 Oct 2009 14:37:00 +0000</pubDate><atom:updated>2009-10-10T07:53:39.187-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">blackhat seo</category><category domain="http://www.blogger.com/atom/ns#">websense</category><title>Spike in Blackhat SEO: Websense Monthly Report</title><atom:summary type="text">Websense published their monthly report, &quot;This Month in the Threat Webscape&quot;. September saw a number of new attacks and an increase in some old ones.

One of the most well known and documented problems this month was blackhat SEO poisoning with malicious results leading to rogue AV and other types of malware.

&quot;Searches for current events often lead to malicious Web sites designed to lead people </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/spike-in-blackhat-seo-websense-monthly.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-4260696302575447720</guid><pubDate>Fri, 09 Oct 2009 16:15:00 +0000</pubDate><atom:updated>2009-10-10T07:52:46.259-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security apps</category><title>Comcast Monitoring Users for Malware and Botnet Activity</title><atom:summary type="text">Comcast is beginning the launch of a new service to notify users when of compromised computers and botted machines. The service, called Comcast Constant Guard, has started an initial roll out in the Denver area. 

Infected customers will be notified via a pop-up message in a browser, and given links to go to the Anti-Virus Center to repair the problem. This will give notification to those not </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/comcast-monitoring-users-for-malware.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-6224468656368447592</guid><pubDate>Wed, 07 Oct 2009 02:20:00 +0000</pubDate><atom:updated>2009-10-10T07:53:22.468-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">web security</category><title>Web Threats Booming: APWG First Half Report</title><atom:summary type="text">The Anti-Phishing Working Group (APWG) released their first half &quot;Phishing Activity Trends Report&quot; with some startling statistics. For those that have not heard of the APWG, the organization devoted to the elimination of phishing and identity theft scams. 

The report gives statistics on many trends inlcuding phishing trends, rogue AV, keyloggers and others and fully reinforces the fact that the </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/web-threats-booming-apwg-first-half.html</link><author>noreply@blogger.com (Green Cloud Security)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivbiWA_K-1vp12MPup8u4gJJV-5vM2eySyCPVaCyyvj3KYxozmKuW3ll4YsIn7bG5wZcEKUHz48vbi6ZTVqD39sDiTDQWVJjEL3nYEaNz6M-7J8sgnWJsl_YIAH-KOlQftpYoS7x6mQ8Q/s72-c/apwg1.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-7056307659367517627</guid><pubDate>Tue, 06 Oct 2009 01:27:00 +0000</pubDate><atom:updated>2009-10-19T17:48:14.853-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">botnets</category><category domain="http://www.blogger.com/atom/ns#">malware</category><title>Evolution....New Multi-Function Trojan</title><atom:summary type="text">Webroot has discovered a new trojan that performs a variety of malicious tasks. One of the primary functions is to crack captchas so that forms of all types can be submitted by the attacker. The trojan will download a specific set of instructions from the internet including which sites to attack, and then operate in the background - attempting to connect to targeted sites.

That is not the only </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/10/evolutionnew-multi-function-trojan.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-4008330468614671378</guid><pubDate>Thu, 01 Oct 2009 00:26:00 +0000</pubDate><atom:updated>2009-09-30T17:50:15.040-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">security apps</category><title>Protect Against Keylogging Trojans with KeyScrambler</title><atom:summary type="text">There has been a lot of news lately surrounding key logging trojans including Zbot, Clampi and others. These trojans are designed to steal authentication credentials and other sensitive information, especially for banking and social networking sites leaving users scrambling for ways to protect themselves. 

The highlights of these news articles has been how easily these trojans can evade </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/09/protect-against-keylogging-trojans-with.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-8186267478306449649</guid><pubDate>Sun, 27 Sep 2009 15:50:00 +0000</pubDate><atom:updated>2009-09-27T08:57:49.272-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">botnets</category><category domain="http://www.blogger.com/atom/ns#">malware</category><title>Zbot Trojan: World&#39;s Most Dangerous Malware</title><atom:summary type="text">The Zbot Trojan, aka Zeus or WSNPoem, is the world&#39;s largest and most dangerous malware. A recent whitepaper by Trusteer, who specializes in securing online transactions, proven the Zbot trojan has an incredibly low detection rate amongst anti-virus scanners.

Trusteer reports that 3.6 million PCs are infected in the US alone, and even up to date anti-virus scanners cannot stop it. &quot;Installing an</atom:summary><link>http://greencloudsecurity.blogspot.com/2009/09/zbot-trojan-worlds-most-dangerous.html</link><author>noreply@blogger.com (Green Cloud Security)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjemTaAwVTY3x6V5Jyg6iBbb0wsGKFMfSJhY2booeh2iyMUTAvdFt0mdoCTBaBgVGbIH43U8ygRVgyAaoBkZqpprrDkeTQJ4au3lTY76G4KgO718xyFviD28i1WIRA8HNZaxBfZHE2TJSM/s72-c/zeusfilelocations.png" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-8704346475729061915</guid><pubDate>Thu, 24 Sep 2009 02:57:00 +0000</pubDate><atom:updated>2009-10-19T17:47:37.527-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">malicious sites</category><category domain="http://www.blogger.com/atom/ns#">scam</category><title>Newly Listed IRS Scam and Zbot Domains</title><atom:summary type="text">A new list of IRS Scam and Zbot domains was recently posted on malwareurl.com. These are interesting as the domain names are altered only slightly and end in .eu. There are a total of 28 domains and 20 unique IP addresses. 

yoky1w.eu 79.117.171.75
mi11f1.eu 187.64.34.106
mi11fa.eu 187.64.34.106
mi11fd.eu 79.184.58.166
mi11fe.eu 187.64.34.106
mi11ff.eu 85.106.95.114
mi11fi.eu 194.54.48.50
</atom:summary><link>http://greencloudsecurity.blogspot.com/2009/09/newly-listed-irs-scam-and-zbot-domains.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-4719673825422337695</guid><pubDate>Tue, 22 Sep 2009 02:50:00 +0000</pubDate><atom:updated>2009-09-21T19:54:53.731-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">web security</category><category domain="http://www.blogger.com/atom/ns#">websense</category><title>Introductory Post</title><atom:summary type="text">As internet threats continue to evolve it&#39;s becoming clear that web threats and blended threats are becoming the most predominant danger to network security. Green Cloud Security and this blog are dedicated to the proliferation of information about web security issues - increasing awareness for both network administrators and regular internet users.

The creation of this blog comes on the heels </atom:summary><link>http://greencloudsecurity.blogspot.com/2009/09/introductory-post.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-5444458813582258922.post-7720513749677292143</guid><pubDate>Sun, 20 Sep 2009 22:07:00 +0000</pubDate><atom:updated>2009-10-03T19:13:03.601-07:00</atom:updated><title>Resources</title><atom:summary type="text">Below is a list of resources that can be used to analyze web based threats, viruses and malware. I will update this list continually.


Web Analysis Services
Virus Total - http://www.virustotal.com/
Wepawet&amp;nbsp; - http://wepawet.iseclab.org/
Virus.org - http://scanner.virus.org/
JSUnpack - http://jsunpack.jeek.org/dec/api
Web Sniffer - http://web-sniffer.net/

 

Applications and Plugins
</atom:summary><link>http://greencloudsecurity.blogspot.com/2009/09/resources_20.html</link><author>noreply@blogger.com (Green Cloud Security)</author></item></channel></rss>