Saturday, September 27, 2008

IP SAN solutions from NavigateStorage are the right choice

Ease the storage management and economic burden of data storage by implementing an IP SAN from NavigateStorage. We are experts in the field with over eight years of SAN experience.

Whether you're currently managing multiple direct-attached storage devices or you're looking for enterprise-class features in an IP SAN, we will meet your requirements for simplicity, performance and functionality. Our IPSAN arrays come from vendors from A -Z but only from vendors with the reputation for quality, performance and value.

So give us a shout today and let us propose the right solution for you. Contact us and let us know how we can help.

Wednesday, September 24, 2008

PandaLabs detects a malicious program used to create fake YouTube pages for infecting users

PandaLabs, Panda Security’s laboratory for detecting and analyzing malware, has detected YTFakeCreator, a program used by cyber-crooks to create fake YouTube pages to infect users with malware.

The infection method is as follows: cyber-crooks send an email containing a video with supposedly sensational content (erotic images, death of a celebrity, etc.) and encourage users to click a link to watch the video. This is known as social engineering.

Once they reach the fake page, which is very similar to the actual YouTube site (see image:, the user will see an error message informing that they can’t watch the video as a certain component is missing (a codec, an Adobe Flash update, etc.) and prompting them to download it. However, on doing it, they will actually be allowing malware onto their computers.

YTFakeCreator lets cyber-criminals create these fake YouTube pages very easily. They can enter the text for the error message displayed by the web page; define how long it takes the message to appear; enter the link to the infected file downloaded onto the victim’s computer; and create a false profile similar to those in YouTube to pretend the video has been uploaded by a real user. All this with just a single program (image:

The criminal can choose the type of malicious code to be distributed from these fake pages: viruses, worms, adware, Trojans, etc. “This type of program has led to the increased use of this technique to infect users. The tools made available to cyber-criminals nowadays force users to take every precaution to avoid falling victim to these attacks”, explains Luis Corrons, technical director of PandaLabs. “Also, the fact that the pages used by criminals are very difficult to distinguish from the legitimate pages helps ensure that a growing number of users are infected”.

NavigateStorage is a Panda partner and welcomes you to take a free trial or request more information or a quote.