Paul Roberts

Real SEO Feeding Traffic to Fake Search Engines

Online scam artists are using black hat search engine optimization (SEO) techniques to push more than just malicious software. In fact, SEO is increasingly being used to drive traffic to a range of phony Web based search engines that are feeding cost-per-click advertising scams, according to a blog post from Web security firm zScaler.

Warning About IDS Evasion Greeted by Chorus of ‘Meh’

‘All your IDS are belong to us,’ was the message on Monday, after researchers at networking security equipment vendor Stonesoft announced the discovery of evasion techniques that could be used by sophisticated attackers to bypass network based IDS and IPS. The disclosure raises questions about the effectiveness of a wide range of networking security products, but experts say those kind of questions are nothing new.


A report of a massive ‘privacy breach’ at Facebook reveals, instead, the rickety underpinnings of the modern Internet straining at the demands of new applications. 

When the Wall Street Journal broke a story on Monday about a “Privacy Breach” at Facebook, all the elements were in place for a tech-driven earthquake: the world’s largest social network, the privacy of what the Journal described as ‘tens of millions’ of users of Facebook applications (or ‘apps’) including mega hits like Zynga’s Farmville.

US CERT has issued an advisory following the release, late last week, of a critical patch from RealNetworks for seven vulnerabilities in its common RealPlayer software. CERT recommended users and administrators to review the advisory from Realnetworks to determine which RealPlayer products were affected and to patch any vulnerable systems. 

It’s been tried before, but NSS Labs founder Rick Moy says his company’s new Exploit Hub – a store front for exploit code – can work. In an interview with Threatpost.com, he explains why the current market for exploits doesn’t work for the good guys, and why zero day exploits don’t help anyone.