Friday, January 14, 2005

MSN, Yahoo Catching Up to Google

Google is still the preferred search engine for users, but Yahoo (Nasdaq: YHOO - news) and Microsoft (Nasdaq: MSFT - news) are gaining ground, according to a new report.
After interviewing 2,000 Internet users, market research firm Keynote Systems has found that Google still ranks as the king of the search engine industry, even though actual search results returned by the five top search engines are very similar.
The five search sites examined were Google, Lycos, Yahoo, Ask Jeeves (Nasdaq: ASKJ - news), and Microsoft MSN. In terms of overall usage, Ask Jeeves won the fourth place spot, with Lycos coming in fifth.
"When we did the study six months ago, we were surprised by how strong Google was," said Bonny Brown, Keynote director of research. "Now they're still number one, but they're about where they were before, whereas Yahoo and MSN have made gains."
Coming Up Fast
In its findings, Keynote reported that Yahoo and MSN have improved their performance levels since the last study, which came out in May 2004.
Since then, Yahoo has boosted the number of users who say they would consider the site as their primary search engine by 20 percent, and MSN has upped its figure by 30 percent.
The two companies experienced the highest improvement in Keynote's future usage index, which measures the likelihood of consumers to use a search site as their primary tool.
In that index, 81 percent of Yahoo users and 61 percent of MSN users stated they would return in the future.
Google maintains the top position in the future usage index, but Keynote noted that its overall standing did not improve.
Possible Future Fixes
For companies that want to gain more traction in the search engine market, Keynote's results also point out what users do not like when looking for information.
For example, one in four users complained that the local results were not what they wanted or were not ranked appropriately.
In general, though, the study's results showed that there is overall improvement in how search technology is being tweaked for users.
"Over the past year, the major search engines have made great strides to improve their services, and users have noticed," Chris Sherman, editor of Search Engine Watch, says in a statement.
But loyalty is still fragmented, and that should encourage search companies to improve the quality of the user experience, he added.

Written by: Elizabeth Millard, http://us.rd.yahoo.com/dailynews/nf/tc_nf/byline/29737/13989113/SIG=10r33ca9a/*http://www.newsfactor.com

First Look: Microsoft AntiSpyware

written by: Tom Spring, PC World.com

Microsoft has entered the anti-spyware business with the launch of a free beta version of Microsoft AntiSpyware. The beta software is now availableand covers all the basics a PC user needs when it comes to spyware and adware detection and removal.
In fact, Microsoft AntiSpyware, downloadable here, really is a collection of security and privacy tools that bundles a host of features, such as one that alerts you if someone tries to piggyback bandwidth off your wireless network.
The package is simply a branded version of Giant Company Software's AntiSpyware program, which has been on the market for some time. Microsoft purchased Giant last year. The 6.4MB program works with Windows 2000 (news - web sites), Windows XP (news - web sites), and Windows Server 2003.
Paul Bryan, Microsoft's director of product management for its Security, Business and Technology unit, wouldn't say whether the Microsoft AntiSpyware program would remain free after beta testing ends in July.
In its current form, Microsoft AntiSpyware looks like a winner. It has an intuitive interface that will appeal to Microsoft loyalists. The program is broken down into three main tabs: Scanning, Real-Time Protection, and Advanced Tools, which includes privacy and security features. These features are identical to core features in Giant AntiSpyware.
But Microsoft skeptics will likely find plenty to criticize. For example, a browser-settings lockdown feature can only restore Internet Explorer browser settings to point back to MSN as your home page, IE as your default browser, and MSN Search as your default search engine. Another feature that erases your history files works primarily with Microsoft programs--skipping FireFox, Opera, and AOL software.
Microsoft the Exterminator
The primary Scanning function of Microsoft AntiSpyware is fast and thorough. I found it able to identify the same three spyware threats that veteran spyware detectors Spybot Search and Destroy and Ad-Aware found on the system I used for testing. In fact, during my informal test, Microsoft AntiSpyware's scanning engine was able to scour my drive about twice as fast as Spybot Search and Destroy. Ad-Aware, however, was the fastest of the three.
Once threats are identified, Microsoft AntiSpyware displays detailed information about detected programs including where a threat is located on your computer, a risk rating, and a recommended action to take. From the Scanning tab you can also schedule the program to perform scans daily, weekly, or monthly, allowing for automatic deletion or quarantining of spyware once it's detected.
To keep spyware and adware signatures up to date, Microsoft relies on the SpyNet community network for signature updates. SpyNet is a network of computer users who agree to share information about spyware with one another and maintain an updated list of known spyware and adware signatures.
Real-Time Protection
Microsoft AntiSpyware goes well beyond scanning and removing spyware. A host of functions found under the Real-Time Protection tab help you protect key system processes, applications, and Internet features often targeted by adware and spyware makers and hackers.
For example, under the System Agents tab, the program keeps watch over your dial-up and Wi-Fi connections, alerting you if a third party tries to access your network. Other aspects of real-time protection are Spam Zombie Prevention, which makes sure your PC isn't turned into a spam-spewing machine, and Winsock Layer Service Provider, which assures you that spyware isn't monitoring and recording your network traffic.
The Application Agent component keeps watch over key applications and processes--for example, your Microsoft Startup Files--and makes sure that the list of programs that load automatically when Windows starts is not added to without your knowledge. Other application lockdowns that prevent programs from being modified by third-party applications apply to Internet Explorer browser toolbars, bookmarks, and your Start page.
When I installed a weather-monitoring application during my tests, several real-time warnings popped up from my system toolbar notifying me of attempts to change my Internet Explorer browser settings. A dialog box allowed me to accept the change or deny it.
Advanced Features
The Advanced Features tab offers three tools: Browser Hijack Restore, System Explorer, and Tracks Erase.

As the name implies, Browser Hijack Restore allows you to restore your browser settings to Microsoft defaults. Microsoft really missed the boat here by including support for restoring its Internet Explorer browser, but leaving out support for the competing FireFox, Opera, and Netscape browsers.
Even worse, restore settings for this feature turn your browser into a Microsoft advertisement, with links back to MSN.com, MSN Search, and the MSN Search Toolbar.
The second advanced feature, System Explorer, allows advanced users to modify settings like their browser helper objects, Winsock configurations, and Windows host files.
The third, Track Erase, lets you clear the histories of a number of different programs automatically. The feature lists the programs it identifies running on your system; to clear their histories, simply check the box next to the name. If the IE browser is checked, for example, you will not leave any Web tracks the next time you surf with IE. Track Erase will appeal to those on shared systems and to users who insist on privacy.
However, this tool is Microsoft-centric also. Support for erasing the tracks of programs like RealPlayer and Adobe Acrobat as well as ICQ chat histories can be found here. But you will not find support for the FireFox browser or AOL's AIM chat software or AOL client software.
Keep It Free
I liked Microsoft AntiSpyware and see it as a needed addition to Microsoft-authored security tools for average users. My fingers are crossed that Microsoft will keep this collection of security and privacy tools free.
However, I don't recommend that you stop using competing products such as Spybot Search and Destroy or Ad-Aware. It's always a good idea to scan your system with another product (but not at the same time), just to make sure every single spyware and adware application is zapped.

Secret Service Data Compromised in T-Mobile Hack

A malicious hacker penetrated the network of mobile phone company T-Mobile USA and accessed information on 400 of the company's customers, including sensitive information from the account of a U.S. Secret Service agent, according to statements by T-Mobile and the Secret Service.
In an e-mail statement, the Bellevue, Washington, mobile carrier acknowledged that Nicholas Jacobsen, a California-based hacker, compromised its internal computer systems in 2003 and viewed the Social Security (news - web sites) numbers of 400 customers. A grand jury in California charged Jacobsen with one count of unauthorized impairment of a protected computer and one count of unauthorized access to a protected computer, according to a copy of the indictment.
Included among the customers was a U.S. Secret Service agent who had agency materials linked to Secret Service investigations stored on T-Mobile systems. That information was obtained by Jacobsen, but did not compromise any ongoing work, according to Secret Service spokesperson Jonathan Cherry.
The unnamed agent violated rules that forbid sensitive documents from being copied to other computer systems, Cherry says. He would not comment on whether the agent would be punished for the breach of policy.
Events Come to Light
The statement from T-Mobile, which is now part of Deutsche Telekom, shed some light on published allegations that Jacobsen used his access to T-Mobile to explore the accounts of members, including the U.S. Secret Service employee and celebrity cell phone accounts that stored snapshots taken on T-Mobile phones.
The company says that Jacobsen is believed to be involved in other attempts to gain access to customer information and that it is cooperating with the Secret Service in investigating those allegations, including allegations about access to customer photos.
T-Mobile claims that it discovered the intrusion on its network in October 2003, then reported it to the U.S. Secret Service. After launching an investigation into the hack, the Secret Service found that its own agent was a victim of information theft, and contacted T-Mobile about the leak of sensitive documents over its network in 2004, according to Kyle Warnick, a company spokesperson.
Secret Service could not comment on published reports that an informant alerted agents that sensitive documents were circulating on the hacker underground, Cherry says.
Customers whose accounts were accessed by Jacobsen were notified in writing about the breach, in accordance with California law, in early 2004, but only after the company received clearance from the Secret Service. T-Mobile is unaware of any problems with those accounts stemming from the hack.
Safeguarding customer information is a top priority for T-Mobile, the company says.

Wednesday, January 12, 2005

New Worm Wishes Users a Happy Nude Year

A new worm dubbed Wurmark-D has been reported by antivirus software maker Sophos.
Distributed through a large-scale e-mail campaign, the worm has a subject line of "amusing file" and includes an attachment of a photograph that features naked men and women whose bodies spell out the words "Happy New Year."
When opened, the worm installs itself on the user's PC, immobilizing security software and then forwarding itself to e-mail addresses stored in the infected computer.
The worm most likely was created to take advantage of employees returning from a long holiday season and facing a large volume of unopened e-mail, Sophos has noted.
So far, Sophos has received only a few reports of infection, and the firm does not expect widespread problems.
Stating the Obvious
Wurmark is hardly the first incidence of worm creators and virus writers using porn as a way to woo users into opening an infected file.
Last year, a variant of the Sober worm was distributed in Germany with promises of photos of a blonde 21 year-old go-go dancer.
But the inclusion of nude photos has become enough of a tip-off for e-mail users that Wurmark should find limited distribution because of it, said Graham Cluley, senior technology consultant for Sophos.
"It's just so obvious," he told NewsFactor. "In many ways, we should thank the virus writer for creating something so blatantly infectious. Even people who barely use e-mail will know this one's suspicious."
Clear and Present Danger
In addition to the flagrantly obvious method of attracting e-mail users with nude photos, Wurmark also does its work without much subtlety.
"You can tell when it's infecting your computer," Cluley noted. "That makes it slightly unusual, because most worms now can infect without being detected."
Although the worm is not spreading far, there is a possibility that it will be passed on by people who enjoy sharing amusing photos and, especially, nude snapshots.
"I'm guessing this will be spread by young guys the most," joked Cluley.
Staying Safe
Despite the worm's limited spread and straightforward infection characteristics, Sophos recommends that users be aware of it and take appropriate steps.

"Of course, people should exercise caution," said Cluley. This includes refraining from opening suspicious e-mail attachments, and running files through virus detection software