Jokes and pranks, scary stories, wicked costumes and jack-o’-lanterns
are all part of the innocent arsenal of Halloween. By moving them to the
on-line world and adding some malicious payloads, we obtain the perfect
combination for a successful nightmare of systems and data.
The potential Halloween malware offensive, using social
engineering strategies and speculating behavioral vectors of attack, such as
entertainment and curiosity, will be most likely deployed over three particular
channels: social networks, e-mail and Web sites.
Social network platforms, like TwitterTM and Facebook