Feeds

Cybercrooks befuddled by Icelandic volcano name

How do you spell that, again?

Protecting against web application threats using SSL

Scareware slingers have balked at using the name of the Icelandic volcano that this week has prevented planes flying across much of Europe as a theme for search engine manipulation campaigns because its name is simply too complicated.

Distributors of rogue security software can normally be relied upon to latch onto any item of news as a motif for attempts to make sure links to scareware portals appear prominently in the searches for likely terms via Google or other search engines. Links promising pictures of the spectacular storms around eruption volcanoes in Iceland would fit right into this strategy, but their appearance has been halted because no one agrees on how to spell the name of the volcano at the centre of the event.

Eyjafjallajökull, despite being arguably the biggest news story of the year so far, is simply too difficult to spell for most surfers, let alone virus writer types not known for their mastery of grammar and punctuation.

That's not to say black-hat SEO attacks riding on the coat tails of the volcanic ash clouds spreading over Europe have failed to materialise. But instead of using the name of the volcano, hackers have taken the more prosaic approach of using search terms such as "Iceland Volcano Images" as themes for their attacks, as explained in a blog post by Luis Corrons of Panda Security here. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.