Quoted in Technewsworld.com: Botnet Twists the Knife in iCloud Security

Author:Richard Adhikari

Article:Botnet Twists the Knife in iCloud Security

Reduce, Reuse, Recycle

For the record, though, “Waledac and Kelihos both send spam, and this is the reason for the confusion,” IT security expert Sorin Mustaca told TechNewsWorld. Both use email to spread but in different ways.

The same group of cybercriminals may have created the code for these worms, because “there aren’t that many cybercriminals who can create a complex piece of software,” Mustaca suggested. “This is just using the old Kelihos [worm] with a new email payload.”

Fixing the Problem

Symantec reiterated well-known practices users can follow to protect themselves: Be suspicious of messages claiming your account has been restricted or needs updating; be wary of links in emails; don’t provide personal information when replying to emails; don’t enter personal information in pop-up pages or windows; and use comprehensive security software.

“This is not Apple’s problem directly,” Mustaca said. “However, they could enforce two-factor authentication and take other steps. Usability drops when you want to make a process more secure, so they need to experiment.”


© Copyright 2014 Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity

Check www.mustaca.com for the IT Consulting services I offer.
Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie http://de.itsecuritynews.info für IT Sicherheits News auf Deutsch

About the Author

Sorin Mustaca

Sorin Mustaca, (ISC)2 CSSLP, CompTIA Security+ and Project+, is working since year 2000 in the IT Security industry and worked between 2003-2014 for Avira as Product Manager for the known products used by over 100 million users world-wide. Today he is an independent IT Security Consultant focusing on Cybersecurity, secure software development and security for IoT and Automotive. He is also running his personal blog Sorin Mustaca on Cybersecurity and is the author of the free eBook Improve your security .

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close