Dennis Fisher

About

Dennis Fisher is a journalist with more than 13 years of experience covering information security.

Scareware, Black Hat SEO and You

The scareware and rogue AV problem that initially appeared a few years ago and has since found its way onto thousands and thousands of legitimate Web sites, including The New York Times home page, has now reached epidemic levels. The scams are mostly boilerplate and well-understood, but it’s not often that we get to take a peek behind the curtain and see the inner workings of the schemes. Here’s just such a chance.

Android Also Gives Google Remote App Installation Power

The remote-wipe capability that Google recently invoked to remove a harmless application from some Android phones isn’t the only remote control feature that the company built into its mobile OS. It turns out that Android also includes a feature that enables Google to remotely install apps on users’ phones as well.

This Week in Security: Patchapalooza, iOS 4 and the Irrelevance of Full Disclosure

This week was one of the ones that my colleague Ryan Naraine often refers to as a Patchapalooza, with each day bringing a new set of fixes for Firefox, Opera, the iPhone or some other device or application. And it didn’t even include Microsoft or Adobe. Go figure. The week also included the revelation of a major flaw in Firefox and the approval of a new cybersecurity bill in Washington. Read on for the full week in review.


As the events of recent weeks have shown, there is no better way to start a dumpster fire of an argument among a group of security people than to bring up the hideous, threadbare topic of full disclosure. No one is ambivalent about it; everyone has an opinion, and usually a strong one. But what’s become increasingly clear of late is that, in the era of sophisticated, highly targeted attacks, it just doesn’t matter.

Security experts are warning about a fresh round of attacks against SSH implementations. The attacks are brute-force attempts to authenticate to remote SSH servers, a tactic that has been used quite often in the past in distributed attacks.