Language Selection

English French German Italian Portuguese Spanish

Britney Spears a hit with hackers

Filed under
Security

The celebrity whose name is used most by hackers creating computer e-mail viruses has shifted from Microsoft chief Bill Gates to pop singer Britney Spears.

Researchers at the Glendale, Calif.-based security software-maker Panda Software combed through the seven years of virus-laden messages, and created a top-10 list of names used to dupe people into opening malicious code, or "malware."

In descending order of popularity, they listed Spears, Gates, Jennifer Lopez, Shakira, Osama bin Laden, Michael Jackson, Bill Clinton, Anna Kournikova, Paris Hilton and Pamela Anderson, IGD New Service said Tuesday.

Virus writers will use the names of celebrities to entice users into clicking on Web links or open up files that then infect their computers, said Patrick Hinojosa, chief technical officer at Panda.

"It`s a method of social engineering -- a lot of the time it has to do with the timeliness of a current news event," Hinojosa said.

UPI

More in Tux Machines

today's howtos

Phoronix on NVIDIA

  • Compute Shader Support Patches For NVIDIA Fermi On Nouveau
    Samuel Pitoiset has published a set of twelve patches for implementing compute shaders support within the Nouveau NVC0 Gallium3D driver for the GeForce 400/500 "Fermi" graphics processors.
  • NVIDIA Posts Latest PRIME Sync Patches On Road To Better Support
    Alex Goins of NVIDIA has spent the past several months working on PRIME synchronization support to fix tearing when using this NVIDIA-popular multi-GPU method. The latest patches were published this week.
  • The Best Graphics Card Brands For NVIDIA/AMD GPUs As A Linux Consumer?
    One of the most frequent topics I'm emailed about is any brand recommendations among NVIDIA and AMD AIB partners for graphics cards. For Linux users, is there a particular brand preference for graphics cards? The short story is, no, there isn't one particular brand when selecting either a GeForce or Radeon graphics card that a Linux gamer/enthusiast should go with over another AIB partner. Over the past 12 years of running Phoronix, there has been no single AIB partner that superbly stands out compared to the rest when it comes to graphics card AIB partner brands like ASUS, Zotac, HIS, MSI, etc. They all work under Linux, rarely the AIB differences extend beyond the heatsink/cooler and any default clock speed differences, and I haven't seen one that's over-the-top crazy about Linux. I also haven't seen any major partner consistently put the Tux logo or other Linux markings on their product packaging, let alone incorporate any Linux drivers onto their CD/DVD driver media.

Now Zenwalk 8.0 BETA 2

Zenwalk 8.0 release is very close : BETA2 is ready now ! Beta 2 fixes several minor bugs in Zenwalk "z" serie of packages, and also provide all beta2 bugfixes at Slackware level. Read more

Security Leftovers

  • ‘White hat’ then, Red Hat now
    “From white hat to Red Hat,” was the joke a senior executive of Red Hat quipped to Alessandro Perilli, after hearing excerpts from The Manila Times interview with him, to which Perilli answered back with a wink, and a seemingly knowing smile. In the vast world of technology, a “white hat” is an internet slang, which refers to an ethical computer hacker or a computer security expert who hacks with the intention of improving security systems. Perilli is currently the general manager for Cloud Management Strategy for Red Hat, the world’s leading provider of open source solutions. The technology company recently hosted a full-house Red Hat Forum Asia Pacific in Manila, where key senior executives were in attendance.
  • Vulnerability in Font Processing Library Affects Linux, OpenOffice, Firefox
    Four vulnerabilities in the Graphite (or libgraphite) font processing library allow attackers to compromise machines by supplying them with malicious fonts.
  • Air Force to develop cyber-squadrons, Gen. Hyten says at Broadmoor symposium
    The Air Force plans to revolutionize how it handles computer warfare by beefing up its force of cyberspace experts while contracting out easier jobs, like running the service's network.
  • USENIX Enigma 2016 - Usable Security–The Source Awakens