Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
McAfee - Alia Bhatt is the Riskiest Celebrity in Indian Cyberspace PDF Print E-mail
Written by Administrator   
Wednesday, 22 October 2014 07:00

Ibtimes.co.in reported on 13th October, 2014 stating that security firm McAfee has revealed in a recent survey the names of most-searched Indian celebrities in Indian cyberspace with Bollywood actress Alia Bhatt topping its list.

As per the eighth edition of McAfee's most sensational survey, cyber criminals are taking advantage of the public's fascination for celebrities and entice them to websites maligned with malware enabling them to embezzle passwords and personal details.

Alia lead the list with 81 infected search results followed by Aamir Khan (78 malicious sites), Priyanka Chopra (69), Shahrukh and Salman Khan (64 each), Katrina Kaif (63), Shradha Kapoor (62), Ranveer Singh (61), Deepika Padukone (60), Hrithik Roshan (59) and Sonakshi Sinha with 58 malware ridden websites to her name.

The Times of India published news on 13th October, 2014 quoting the details and confirmation of the survey by Venkat Krishnapur, Vice-President of Engineering-Consumer, Business Group, McAfee India Center as "Fans treat Celebrities like demi-gods and want to know everything about their favorite stars by downloading their latest pictures, wall papers and music videos. So it's not only information but also videos and pictures which lure fans to search for their favorite star on the Internet. We have found from the survey that cyber criminals look for 2 things which are most popular and loved celebrity and the most trending celebrity and Alia Bhatt has been trending recently because of her new movies, selfies, Internet memes, spoof videos, etc."

He added that cyber criminals are constantly searching for ways to take advantage of fans interest related to TV shows, movies and latest trends of celebrities.

Surprisingly, Kareena Kapoor, Akshay Kumar, Saif Ali Khan, Amitabh Bachchan, Farhan Akhtar and Sunny Leone who stood at 4th, 5th, 6th, 7th, 8th and 9th positions respectively last year have all dropped out of this year's list.

McAfee advised that users must be aware about clicking links of third party and should ensure the usage of web protection which informs users about any fake sites or links before they visit or click them.

Moreover, users should avoid downloading videos from suspected websites and "free downloads" as it is the highest virus-prone search term.

Read more... - McAfee - Alia Bhatt ...
 
Retefe Trojan Now Attacking Financial Institutions in Japan, Says CSIS PDF Print E-mail
Written by Administrator   
Wednesday, 22 October 2014 07:00

According to CSIS the security company based in Denmark, the Retefe malware's configuration file has been found containing one name-list of a number of banks and other financial institutions to be targeted, with the malware currently hitting banks inside Japan as well.

The malware, which is in fact a Trojan, gets disseminated via junk e-mails as also arrives in disguise of a file attachment from some credible organization. However, if the attachment is viewed, the Trojan changes the DNS details along with Certificate Memory pertaining to any Windows computer.

Subsequently, the Retefe downloads fresh certificates and ensures that all traffic protocols get altered for diverting the e-traffic onto the remote attackers' computers. However, the victim's PC considers its SSL connection as secure despite there not being any defense against such assaults.

The entire process eliminates any doubt of sinister operation being carried out on the PC as no threat gets identified, while the victim senses the digital certificate as maintaining safe communication with the bank, whereas actually all of the traffic gets transmitted via sinister servers.

But, security researchers intercepted the Trojan in time to be examined thereafter. They discovered a modified form of the list-name containing the would-be attacked entities, while there were thirty-or-more web-pages included associated with many banks operating in Japan.

Retefe isn't unknown. It drew the notice of security experts as well as the media long back when during Operation Emmental (the name Trend Micro gave), the Trojan played the vital role. Incidentally, Emmental is name of a Swiss cheese.

During Emmental's activity, the cyber-criminals hacked into PCs belonging to bank clients within Austria, Sweden and Switzerland along with many other European nations.

As with online bank transactions, the two-factor authentication normally works; the attackers instructed the victims for taking down one bogus banking application they used for tapping the authentication codes users received from their banks.

Now, for remaining safe from the Trojan's infection, CSS suggests end-users use the most recent anti-virus for scanning their system as also deploy an auto-updater, a kind of software that keeps hunting fresh updates and loads any automatically onto the system.

Read more... - Retefe Trojan Now At...
 
ATO asks Taxpayers to be Wary of Tax-themed Scam Emails PDF Print E-mail
Written by Administrator   
Tuesday, 21 October 2014 07:00

Online news website Magnet reported on 14th October, 2014 stating that The Australian Taxation Office (ATO), official taxing agency in Australia, is warning the community to be careful of fraudsters as they are targeting people lodging their income tax returns before the deadline of 31st October (2014).

The Magnet itself was targeted by getting one such scam email on Monday morning, 14th October 2014, which read, as "You are eligible to receive a tax refund of $247.09 according to the last annual calculations of your fiscal activity."

The email also produced a tax file number and asked the recipient to click a link to download the form for refund of tax.

The email was sent from an email address, which did not contain ato.gov.au at the end and did not address to any individual but to a generic email address, which has not been use for many years.

Magnet recognized these signs and forwarded the email to ATO, which confirmed it as a scam email.

Magnet published a report on 14th October, 2014 quoting Todd Heather, Chief Technology Officer of ATO, as saying "Scammers are trying to get taxpayers quickly lodge their return by the deadline. People should be careful about tax scams and report them to us directly."

Fchornet.com published a report during middle of September 2014 quoting a warning of Detective Superintendent Brian Hay as that one should never access personal information on Internet cafes and use only updated operating system to avoid the chances of being victimized by such scam emails.

He added: "You must get latest anti-virus patched so that your system gets scanned regularly on daily basis. And you need to be more disciplined about what information you provide on the Internet so that you don't post too much personal information or photographs on a device which has activated the geo-locator settings as it informs the crooks about your whereabout."

Meanwhile, it is not only the Australian taxing agency which is alerting people about tax-themed emails as Revenue Commissioners, the tax-agency of Ireland, also released similar warnings because scam emails there also promised refund of tax to innocent taxpayers.

Read more... - ATO asks Taxpayers t...
 
Volexity - Websites of Pro-Democracy in Hong Kong Compromised PDF Print E-mail
Written by Administrator   
Tuesday, 21 October 2014 07:00

Computerworld.in reported on 13th October, 2014 quoting Volexity, a security company based at Washington D.C. as "In Hong Kong, four websites which promote democracy, have been rigged to spread malicious software."

Computerworld.in reported on 13th October 2014 quoting Steven Adair, Founder of Volexity, as saying "Findings reveal that rebellious groups particularly those looking for more freedom are targeted more frequently for surveillance and extraction of information."

Security experts have observed slight increase in attacks targeting activists who have demonstrated in Hong Kong to protest against restrictions placed by China on election for Chief Executive of the territory in 2017.

The websites are the association of True Democracy (ATD), People Power in Hong Kong, the Democratic Party Hong Kong (DPHK) and The Professional Commons and according to Adair browsing to these websites is not advised because some attacks are still alive.

Adair wrote that both DPHK and ATD websites planted code pulling a suspected script from a different domain known as "java-se.com" that has been linked to nasty activity before and the domain was also used to attack www.nikkei.com in early September.

The researchers investigated and find themselves in association with People Power, which is popular for its democratic stand.

Volexity analyzed the website and discovered malicious iframes directing to exploit webpages and the malicious links have been cut via the Chinese URL and cut service 985.so.

The researchers discovered four links of this type out of which three direct to exploits hosted on the same IP address.

Softpedia.com published a report on 13th October, 2014 quoting Adair as saying "The pages carry scripts profiling the system for different software, plugins and other associated information and also carry Java exploits which is crafted to install malware on the system of the target. If it becomes success, the exploits shall install either a 64-bit or a 32-bit version of the malware."

The Professional Commons website is slightly unclear as it contains a suspicious iframe which guides to a page of a website of a South Korean Hotel. However, the landing webpage doesn't exist and a redirect to the core webpage is executed.

Read more... - Volexity - Websites ...
 
ANZ Bank Customers Hit with Phishing Scam PDF Print E-mail
Written by Administrator   
Monday, 20 October 2014 11:00

Phishing e-mails are being sent to clients of the banking group of Australia and New Zealand namely ANZ Bank, which is based in Melbourne, Victoria, Australia as the messages masquerade as the famous banking institution, published softpedia.com dated October 13, 2014.

Reportedly, the phishing e-mail tells its recipient that his account with ANZ needs repeat confirmation, the process claimed as necessary for maintaining an up-to-date account.

Further, according to the e-mail, the user doesn't have even 24-hrs for hitting on a given button labeled "Re-confirm" for including his A/C within ANZ's database.

But, in reality, ANZ hasn't sent the e-mail rather it's one phishing scam created for duping accountholders into revealing the login details of their accounts.

Anyone who follows the web-link embedded on the fraudulent e-mail would get led onto a fake site crafted to mimic the real login page of ANZ Bank. Then if the person types in his client reference number as well as password onto that phony login page, his Web-browser would typically divert onto the real site of the bank.

At this instance, the user is likely to think he has effectively fulfilled the 'Re-confirmation' procedure without knowing he has actually been tricked.

Consequently, he is likely not to report the scam thus making sure the malevolent e-mail outbreak continues even longer.

Yet, when the scam may get caught, it'll be too late as already the cyber-criminals would have got hold over the credentials, which they would use to steal from the bank A/C, in case the dual-factor validation from the bank isn't enabled.

Here it's greatly recommended that extra forms of validation be used alongside client number or password-username duo, security analysts of the currently going e-mail scam remark.

Meanwhile, ANZ Bank isn't the only institution to be targeted with a phishing scam, recently. During September 2014, Sydney-based Westpac Australia too cautioned its clients for destroying a spam mail that had a header "Westpac Secure E-mail Notification," while asserted recipients had got one secure message. In addition, there was an attachment in the e-mail that required opening if the secure message was to be read, the fake electronic mail indicated.

Read more... - ANZ Bank Customers H...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1196
Polls
The Spamproblem is
 
Who's online
We have 24 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us