Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
BBB and Police Warns About Fake Emails Targeting Parents PDF Print E-mail
Written by Administrator   
Thursday, 29 January 2015 08:00 reported on 20th January, 2015 stating that Better Business Bureau (BBB) and Greensboro Police (North Carolina, US) are sending a strong message to Internet users asking them to look for a new email scheme targeting parents.

A dangerous and fake email is advising readers that a child predator is in their locality and trying to collect personal and financial information illegally.

The website and email looks genuine and says that this based on your "local area zipcode" but authorities are advising people to not to open the web link attached in the email because it will install malware on the computer of the recipient.

The email itself looks like a "community safety" and so it is a warning to parents of a child predator in the nearby locality. However, Better Business Bureau says that it is just another way of trick to collect the identity and money from the people.

It said that it pulls the heart strings of parents and they will react to according to attackers.

The email reaches on your computer with "Alert: There is a Child Predator Living Near You" as the subject line.

However, when you click the link, you are redirected to a legitimate website known as "Kids Live Safe" which is the part of the plan.

While "Kids Live Safe" is actually a genuine site but the way the user takes to get there is not safe. It is dangerous and offensive but just like the threat of child abuse, it is not wise to assume that everyone on the Internet is safe and well meant.

Generally, it is not safe to click links which come as attachment with unsolicited emails. It is always better and safe to search for the actual organization with your browser to get more information.

Cross check the "From" field because scammers can conceal email addresses making the email appearing to come from a genuine source but they do not use it always. Check for email addresses which do not match the brand targeted in the email.

Look for strange phasing, typo and wrong grammar. Awkward wording and incorrect grammar are indications of a scam message, as in the above case, "local area zipcode".

Read more... - BBB and Police Warns...
Cyber-Attacks Growing with Casual User Behavior and Targeted Malware Campaigns PDF Print E-mail
Written by Administrator   
Thursday, 29 January 2015 08:00

Cisco in its new Annual Security report states that end-users' careless attitude together with malware attacks on specific targets are posing risk of security breaches to many industry segments with the greatest danger being for chemical-and-pharmaceutical sector.

End-users who remain chief targets likely even unwittingly assist cyber-assaults. The threat intelligence investigation team of Cisco reveals that all through 2014, attackers turned their attention away from operating systems (OSs) and servers since greater number of users accessed hijacked websites for downloading content thus resulting in Silverlight attacks to rise 280% while malvertising exploits and spam increased 250%.

In targeted attacks on end-users, the medium for disseminating undesirable applications or malware are browser add-ons, a strategy proving effective as numerous end-users essentially trust add-ons alternatively just regard them harmless.

There's greater sophistication observed among adversaries within their style of executing assaults as well as in eluding identification, the report states.

The attackers alter the tools and techniques employed in just no time, getting clean of tracks on a network prior to getting them to halt else swiftly select another mode for gaining admission.

According to Principal Engineer Jason Brvenik with Security Business Team of Cisco, attackers have gotten increasingly efficient in exploiting security gaps. published this, January 20, 2015.

Brvenik adds his organization noticed 56% of the entire OpenSSL editions continuing to be susceptible to Heartbleed while prominent assaults just utilize 1% of extremely important security flaws at any point-of-time.

John Stewart CSO at Cisco says that deploying security patches is a really difficult task within a complicated Information Technology arrangement since then the IT system requires being made non-operational. published this, January 20, 2015.

Moreover, the necessary patches mayn't yet be obtainable alternatively no patch has any longer been applied to the software.

Stewart states that he's aware of companies which continue to use Windows NT without patching.

Conversely, if a company has complicated environment alongside numerous suppliers, patching maybe greater in number than what it can cope with.

Cisco for its research interviewed security executives from 1,700 businesses within United Kingdom and 8 more nations among which Germany, USA, China and India are included.

Read more... - Cyber-Attacks Growin...
Infamous Hacking Group ‘Lizard Squad’ Hacked by Third Party Hackers PDF Print E-mail
Written by Administrator   
Wednesday, 28 January 2015 08:00 reported on 19th January, 2015 quoting a claim by Brian Krebs, a well-known Security Researcher, as "The hacking group namely 'Lizard Squad' guilty for bringing down the networks of Sony's PlayStation Network and Microsoft's Xbox Live on Xmas (2014) has been hacked by an unknown third party."

The Lizard Squad proposes a service called LizardStresser which allows anyone to hire a botnet to perform distributed denial of service (DDoS) attacks.

The malware has infected a botnet which is a network of systems or computers known as routers in this case and hackers controlled remotely attacking a particular website with traffic till the time the website goes down.

Lizard Squad rents out access to the tainted computers as a service enabling others to perform their attacks. The Squad even depicted Xbox and Sony hacks as a promotional tool to create curiosity in their service.

Unfortunately, things have not gone all that well for LizardSquad ever since the launch of LizardStresser as it has been struck by a number of unlucky incidents.

It seems the database consisting all emails, usernames and financial information of people who opted for this service have been hacked by an unknown third party and released to the general public. published news on 19th January, 2015 stating that KrebsOnSecurity obtained a replica of database of customers of LizardStresser which highlights that it attracted over 14,241 registered users but only few hundred seem to have financed accounts at the service. Interestingly, all registered usernames and passwords were shelved in plain text and the database shows that patrons of the service deposited over USD $ 11,000 worth of bitcoins to pay for assaults on thousands of online addresses and Web sites (Including this one).

And as if that were not bad enough, one of the members of Lizard Squad was apparently arrested in the UK. Krebs first identified Vinnie Omari against whom a warrant was released for his arrest and he surrendered to officials in the country.

Moreover, Police in Finland quizzed a 17-year old namely Julius "Ryan/Zeekill" Kivimaki, after he and Omari gave an interview to Sky News about the assaults.

Read more... - Infamous Hacking Gro...
LIME Customers Targeted with Phishing E-mail Scam PDF Print E-mail
Written by Administrator   
Wednesday, 28 January 2015 08:00

Several gullible customers of "Landline, Internet, Mobile, Entertainment" (LIME) one renowned telecom company, were recently targeted with an e-mail scam. Actually, over the past days, clients got e-mails making fake assertion regarding the position in which their accounts were while directing them towards using a web-link for validating the problem, thus published, January 19, 2015.

LIME, reportedly, issued a release stating that the e-mail, which was circulating for its clients, contained the previous symbol of the company while showed the sender's address as This e-mail address is being protected from spambots. You need JavaScript enabled to view it . The release noted that the message in reality was one fraudulent phishing electronic mail. published this.

Phishing involved dispatching bogus e-mails which impersonated legitimate organizations and frequently contained organization logos which appeared genuine, LIME stated.

According to Marketing Head Julie Hutton in-charge of LIME Cayman Islands, LIME won't ever direct customers to carry out modification in their accounts' security, alternatively dispatch electronic mails for garnering passwords/usernames, e-mail ids as also further personal details. published this.

Ms. Hutton explains that incase anybody gets an e-mail asserting as a message from LIME while requests A/C details, then that e-mail must be recognized as false as also an attempt for garnering private details for subsequent utilization towards committing fraud. So no web-link on such e-mails must be followed, instead they should be deleted. But supposed somebody has already followed the web-link then he should immediately alter his passwords.

Worryingly, it's just not LIME rather different other renowned telecommunication firms which too become targets of phishers often, especially because they've big customer bases. With increase in company's size, attacks on it become larger, while victims too increase in number.

During October 2014, researchers intercepted similar phishing e-mail that posed as message from Vodafone a phone service company informing users they had one yet-to-be-opened message on their Internet based Vodafone A/C while necessarily follow a web-link for reading that message. The e-mail even tried to appear genuine, so it displayed Vodafone's all-too-familiar red-colored symbol. But, on following the web-link, there wasn't only any fresh message but it also led onto a fake site which imitated the real login page of Vodafone.

Read more... - LIME Customers Targe...
NSA Bears Ability to Compromise and Re-use Intermediate Malicious Programs PDF Print E-mail
Written by Administrator   
Tuesday, 27 January 2015 08:00

Along with owning its own cyber-weapons, NSA of USA performs compromising operations and repurposing of intermediate malicious software, published, January 19, 2015.

By utilizing numerous servers NSA maintains worldwide, the agency keeps track of botnets comprising innumerable contaminated PCs. When required, it resorts to those botnets' features for injecting more malware created at NSA into the already-hijacked PCs via certain methodology codenamed Quantumbot, published Der Spiegel a news magazine in Germany.

A confidential document, which Edward Snowden an erstwhile contractor of NSA exposed as also which Der Spiegel published, has a thorough description of stealthy software from NSA known as DEFIANTWARRIOR which's utilized for compromising botnet PCs that are then utilized as "throw-away computer network attack (CAN) source points of non-attributable nature" and "all-encompassing vantage points for network analysis."

This implies when any user's PC contracts malware, the NSA may perform an own malware deployment on that PC and subsequently utilize the device for attacking targets. Since there's already a previous malware on the infected machine, the NSA attacks wouldn't be identified as coming from the same machine.

The central components aiding NSA's capability of spotting, misleading, blocking as well as repurposing other's cyber-assaults are Turmoil and Turbine, reveals the document. These components belong to NSA's Turbulence group that's used for Internet exploitation and monitoring. The components are further linked with Tutelage, a system of NSA utilized for intercepting e-traffic flowing across America's military networks for saving systems of Defense Department from assaults.

If an assault targeting a PC-network of the Department gets spotted via slow surveillance (maybe via warnings from Turmoil monitoring software alternatively via handling by a database named Xkeyscore), NSA may manage in recognizing the elements working within the assault followed with proceeding to halt it, alternatively perform more operations for duping else disrupting the attacker. All of this though occurs outside the Department's internal networks and on people's common Internet via utilization of "Quantum" assaults thrust inside any routing point of network-traffic.

During past few years, Internet security specialists associated plentiful unearthed malware as originating from NSA along with the agency's Five Eyes partnering countries-Canada, UK, US, New Zealand and Australia.

Read more... - NSA Bears Ability to...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1231
The Spamproblem is
Who's online
We have 36 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us