Category Archives: Security

Terror groups cloning Rogers phones

Better keep those cell phones close at hand, and LOCKED. According to the Globe and Mail law professor Susan Drummond received a phone bill for $12,237.60 – 160 times larger than her normal bill – and which primarily consisted of calls to foreign countries that included Pakistan, Libya, Syria, India and Russia. As a result of researching the fraud, Drummond and her partner discovered that phones of senior Rogers executives, including Mr. Rogers himself, were repeatedly “cloned” by terrorist groups that used them to make thousands of overseas calls. Ms. Drummond is apparently pursuing legal action against the cellphone giant, charging that the company can easily spot a fraud-in-progress, yet “lets the meter run.”

Splogs – part 2

Another form of Splog is a blog that intentionally links to websites for the sole purpose of coming up on a list of “who links here” so that the blog author may, out of curiosity, visit the linking blog. The business model is to display paid placement advertising on that site and hope that a certain percentage of visitors will click on the ads.

If that wasn’t bad enough, there are now such linking blog sites that attempt to inject a virus/trojan when visited. I came across one this morning, Onlinemeetingsolutions.com – don’t go there. I can’t confirm whether the operators of the site are in on it or whether the site has simply been hacked. However, upon visiting the site, it will (according to my antivirus program) try to inject a JS/Wonka Trojan into your system through the browser.

I thought Splogs were bad but now I’ve discovered there are even worst things out there.

Public Wi-Fi Hotspots and VPNs

In recent Security Now podcast segments on VPNs, Steve Gibson reviewed the importance of using VPNs when accessing the Internet through public Wi-Fi hotspots or even Ethernet connections (as for example, those available at hotels). The problem with Wi-Fi is that it can be intercepted, while the problem with even an Ethernet connection is that other hotel guests can run software to capture information and even passwords which are sent in the clear by many programs, particularly POP3 email programs.
Continue reading Public Wi-Fi Hotspots and VPNs