Review fraud: Hijacked Amazon reviews a big problem says Consumer Reports

Review fraud: Hijacked Amazon reviews a big problem says Consumer Reports

The fake reviews problem on Amazon isn't going away any time soon. Amazon’s fake reviews problem is apparently getting worse. But most consumers are unaware of the issue, let alone its size and scope. Amazon, review graders battle over size of problem. FakeSpot and ReviewMeta, which analyze Amazon reviews, have published studies that argue majorities of reviews in specific product categories (e.g.,…
Are Consumer Reviews Trustworthy and Reliable?

Are Consumer Reviews Trustworthy and Reliable?

Looking for a good restaurant? Maybe a contractor to build a fence for you? Many of us do some research before hiring anyone or buying just about anything, and more often than not we find reviews, ratings, and recommendations from other buyers. But how much can you rely on consumer reviews? Online Reviews Some websites,…
How to spot a fake review: you’re probably worse at it than you realize

How to spot a fake review: you’re probably worse at it than you realize

Survey results suggest about three-quarters of the population trust online reviews at least a moderate amount. www.shutterstock.com Adrian R. Camilleri, University of Technology Sydney Ever relied on an online review to make a purchasing decision? How do you know it was actually genuine? Consumer reviews can be hugely influential, so it’s hardly surprising there’s a…
IISerpent: Malware‑driven SEO fraud as a service

IISerpent: Malware‑driven SEO fraud as a service

The last in our series on IIS threats introduces a malicious IIS extension used to manipulate page rankings for third-party websites ESET researchers have discovered and analyzed a previously undocumented server-side trojan that manipulates search engine results by hijacking the reputation of the websites it compromises. We named the trojan IISerpent to highlight its two…
DEF CON 29: Satellite hacking 101

DEF CON 29: Satellite hacking 101

How poking at the innards of satellites can make the future of cybersecurity in space more palatable Here at DEF CON 29, the Aerospace Village is alive and well, and aside from the repeated wailing of the neighboring car hacking village setting the car alarm off every 30 seconds, the hardware sitting here, called a…
Ransomware runs rampant, so how can you combat this threat?

Ransomware runs rampant, so how can you combat this threat?

A new paper explains how ransomware has become one of the top cyberthreats of the day and how your organization can avoid becoming the next victim The infosec community has long been warning that ransomware has the potential to grow into the number one cyberthreat for business. However, since ransom demands were low and malware…
Black Hat 2021: Lessons from a lawyer

Black Hat 2021: Lessons from a lawyer

Why companies and their security teams need to engage with a lawyer before an incident occurs Presentations at Black Hat often involve slides full of data or code. Rarely, or maybe never, have I seen a slide that details parts of a policy, contract or general legal text. Nick Merker, a partner at ICE Miller…
IISpy: A complex server‑side backdoor with anti‑forensic features

IISpy: A complex server‑side backdoor with anti‑forensic features

The second in our series on IIS threats dissects a malicious IIS extension that employs nifty tricks in an attempt to secure long-term espionage on the compromised servers ESET researchers have discovered and analyzed a previously undocumented backdoor, implemented as an extension for Internet Information Services (IIS), Microsoft’s web server software. The backdoor, which we…
Black Hat 2021: Wanted posters for ransomware slingers

Black Hat 2021: Wanted posters for ransomware slingers

Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge? Here at Black Hat, the CISA keynote promises to deliver increased cooperation within government agencies over cybercriminals, especially those focused on critical infrastructure and ransoms against systems that might cripple the country. But that’s not…