All of our loyal Ad-Aware users have heard about Lavasoft's coming attraction, and now the moment you have been waiting for has arrived. Ad-Aware 2007 is coming to a computer screen near you in just a few short days. That's right - Ad-Aware 2007 will be released worldwide on June 7. Make sure to read our "Ad-Aware 2007 Premiere" article for a peek at what is included in the features of Ad-Aware 2007 Pro, Plus, and Free versions.
In this issue of Lavasoft News, we bring you the latest on spyware trends and advancements in online crime. Even as law enforcement officials try to keep up the fight against cyber crime, it's important to stay educated on the latest threats, so you know how to protect your PC and yourself. Get the scoop on e-surveillance, the raging botnet battle, and the booming business of cyber crime.
Write to firstname.lastname@example.org with comments on what you see in this issue and what you would like to see in future issues of LN.
Ad-Aware 2007 Premiere
Cyber-Stalkers Invade Personal Spaces
Botnets Grow in Size and Sophistication
Cyber Criminals: Savvy, Professional and Organized
Top Computer Crimes of 2007 U.S. News & World Report
New Targets in Detection (May 2007)
Ad-Aware 2007 Premiere
The premiere of Ad-Aware 2007 is only days away, and an all-new Ad-Aware anti-spyware will be available online June 7, and on U.S. retail shelves shortly thereafter.
At Lavasoft, our mission is to develop and deliver the highest quality anti-spyware solutions, in order to give computer users the power to control their privacy and security. Ad-Aware 2007 is Lavasoft's answer to the rapidly changing threat landscape in today's cyber world. The fully redesigned Ad-Aware 2007 has a new architecture that allows for more program flexibility and improved malware detection as the industry continues to grow in sophistication.
"The launch of Ad-Aware 2007 is an important step for us here at Lavasoft, setting the groundwork for our focus on the next generation of malware and spyware threats," said Lavasoft CEO Ann-Christine Åkerlund.
At the same time, we know that security does not have to be complicated to be effective and relevant. Ad-Aware 2007 was developed with direct input from computer users representing the spectrum of ability, and the fresh new interface smoothly guides users through the complexities of detecting and removing malware, while still providing advanced options for experienced users.
With Ad-Aware 2007, Lavasoft has responded to the needs of the everyday computer user at home as well as the IT individual in a business setting. Ad-Aware 2007's fully rebuilt engine results in faster scanning times, and is stocked with convenient new additions like automatic scans and Web updates with the Scheduler feature, the TrackSweep privacy tool that erases tracks left behind from Internet browsing with the click of a button, and the built-in Hosts File Editor to block advertisement sites and reverse browser hijack entries.
The 2007 product will be released in three different versions: Ad-Aware 2007 Pro, Ad-Aware 2007 Plus, and Ad-Aware 2007 Free (formerly known as Personal). Take a look at the host of new features included in Ad-Aware 2007 Pro, Plus, and Free by clicking on the product boxes below. While Ad-Aware 2007 will not be Vista compatible right away, a Vista compatible version (32-bit) will be released at the end of August, and all Ad-Aware users with a valid license will immediately receive the Vista compatible version update upon its release. Remember, if you have a valid Ad-Aware SE license, you are eligible for an update to the new Ad-Aware 2007 version, completely free of charge!
Cyber-Stalkers Invade Personal Spaces
You know that the world is becoming a smaller place when it is possible to find an address and get directions with a few clicks on a mobile device. Another few clicks and you can find out the precise coordinates marking your location in space. You may even keep a record of it in time, if you were so inclined.
If it's easy for you, think about how easy it is for others. But why would anyone want to know your precise whereabouts, and what could they do with that information?
Plenty, it turns out.
You don't need to be a high-profile artist to be the subject of unwanted attention. Cyber-stalking can come from a former partner or spouse, a total stranger, or perhaps an estranged co-worker.
The Washington Post recently reported that stalkers with cursory computer knowledge have been able to track the e-mail and Web activity of current or recently divorced spouses. Stalkers can choose from an array of spyware, GPS devices on their own or embedded in mobile phones, and tiny cameras, to keep track of their victims. By working in this way, they can remain anonymous and operate anywhere from a distance of a few blocks, to many time zones away.
The victims of cyber crime may not readily know who is invading their privacy. This, in itself, can make victims feel powerless. But what is worse is that they may not know the extent of the information that may have been compromised. The range of possibilities, from legal documents and financial transactions, to intimate correspondence, is enormous.
Armed with that information, a stalker can decide to show up unannounced to track a victim. Another may choose to send harassing e-mails, electronic junk mail, and computer viruses. And yet another, as reported on CNET News, could intend to use the collected information as ammunition to help win a divorce settlement.
Whichever form they take, these tactics are meant to induce fear. Police departments are being trained to deal with cyber-stalking, but prosecuting these crimes presents many challenges.
How can you protect yourself against cyber-stalking? According to Douglas Schweitzer, an Internet security specialist with Computer World, it is wise to be cautious with your personal information. Follow these guidelines to protect yourself:
Botnets Grow in Size and Sophistication
Botnets, networks of thousands of computers used to spread malware, have become the hottest commodity of cyber criminals. Malicious code, as dangerous as it is, has taken a back seat to the means to deliver it. As a result, hackers and spammers are no longer the sole leading figures responsible for perpetrating cyber crime.
Botnet controllers are responsible for pulling the strings of an increasingly professional and sophisticated cyber crime community. Emerging as a new serious brand of player, they are threatening the very openness of the Internet that we have come to take for granted.
Botnets have the ability to attack the Internet en masse. As a result, the frequency and complexity of attacks is escalating. Another contributing factor is the professionalism displayed by the cyber criminals.
An example of this was recently reported on PC World. Security firm Panda Software discovered an innovative application called Zunker, which was used to control and monitor botnet computers in as many as 54 countries. The tool had been designed to be easy to use and allowed the owner the ability to tune the performance of the network.
As another sign of sophistication, security researchers have found that a growing number of botnets are being used only once. The botnet controller rents the network to the highest bidder and, once an attack is completed, abandons it. This strategy makes it more difficult for law enforcement to track the botnet controllers, or 'bot herders' as they are also called.
Bringing those criminals to justice, though difficult, is not impossible. Witness the sentencing of Jeanson Ancheta, 21, of California to a term of 57 months in a federal prison. Ancheta, a bot herder, controlled and rented 400,000 computers to other cyber criminals who used the network to launch security attacks.
Contributing to the problem is the large number of home users whose computers do not have adequate protection and are easy prey for botnet operators. It is critical that home users install up-to-date firewalls and security software, in addition to practicing caution when going online.
Notwithstanding all the challenges ahead, security experts remain optimistic that the botnet threat can be mitigated without having to alter how we currently use the Internet. The prospect of a closed Internet is not something that would benefit anyone, cyber criminals included.
Cyber Criminals: Savvy, Professional, and Organized
Malware goes mainstream.
Think service contracts, personalization, and upgrades. It’s all there. Suppliers of malware have become quite sophisticated in their offerings. Their motivation? Think one simple word: profits.
Malware suppliers have adopted many of the same business practices used by leading software providers. But they are going one step further. By embracing their competitors, malware suppliers are becoming more like a consortium in their ability to strategically deliver customized offerings, to tap into synergies, and, significantly, to share market intelligence.
Large enterprises may continue to be the most visible of the victims of cyber crime, but they are no longer its main focus. Small to medium-sized firms provide much more viable targets. But how do malware suppliers find the right targets?
One thing is for sure: they are not reinventing the wheel.
Malware suppliers are borrowing market research concepts and turning them into tools that can gather relevant information about potential targets. Armed with treasures such as browser version, operating system software, IP address, and level of security patch, malware writers have a ready end-user profile at hand.
The Internet Security Systems X-Force team at IBM, headed by Gunter Ollman has been actively researching the methods used by cyber criminals. In a recent Info World article, Ollman states that the most sophisticated of these cyber criminals are trading information such as IP addresses to ensure that their latest work is not discovered.
Though they may not have face-to-face meetings or send e-mail correspondence, these cyber criminals have other means of communicating with each other. Whether through chat rooms or bulletin boards, they collaborate in ways that help extend the reach of their malicious code.
There is strength in numbers.
As recently reported in Info World, McAfee’s latest research report shows that criminals are connecting in greater volume than ever before. Dave Marcus, a security research manager at McAfee’s Avert Labs believes that the criminals are doing a better job at communicating than the security industry itself.
Countries like Russia and China, which do not participate in worldwide groups that fight malware use, have become hotbeds for cyber criminals. With no shortage of outlets for the distribution of their malicious code, their activity is expected to flourish in 2007.
VoIP systems are expected to see an increased volume of threats, as are mobile devices like smart-phones. Threats in the form of phishing attacks, spyware, and mobile spam will become more commonplace.
What’s an end-user to do? Natalie Lambert, of Forrester Research, recommends using a multi-layer approach to safeguard yourself. Having a single security measure, such as an anti-virus program, is no longer enough and can’t protect against specific, targeted attacks, the type that are becoming de rigueur for sophisticated malware suppliers.
Security Bill Takes on Botnet Battle
Google Warns of Web Malware
Mobile Phone Threats Continue to Climb
Hacking Through Windows Update
Top Threat: Memory Stick Security