Browsers / Tips /, the malware and adware tracking research project — backed by Google (among others) and run out of Harvard Law School’s Berkman Center for the Internet and Society — has published a new report charting many of the trends it has seen emerging in recent months.

And while the paper (PDF) is fairly rudimentary for anyone closely following the malware and adware industries on a daily basis (like me) there are a lot of interesting factoids laced throughout the (well-written and very readable) 12 page report.

On hijacked Web sites: … Malicious hackers are attracted to the areas where easily exploitable vulnerabilities are most commonly found. These vulnerabilities are frequently concentrated on the tightly-packed shared hosting servers commonly used by small Web sites.

On site attack methods: …Two types of attack emerged as by far the most popular over the first half of 2007. These are the use of iframes to load malicious pages in frames inside otherwise benign pages, and the use of javascript browser exploits.

On adware networks: … Choosing to use third party content means inviting someone else to have control over part of your Web site, and entrusting them with the security of the content they send to your site.

One thought on “

  1. Pingback: Are Flash Cookies Violating Your Privacy? « wpbloggingtips

Comments are closed.