Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
CU Cautions Inmates about Hacker Assault Targeting its IT Network PDF Print E-mail
Written by Administrator   
Friday, 02 December 2016 08:00


Carleton University has issued an alert to employees and students following one external group seemingly trying infiltrating the institution's information technology network. The institution is cautioning that any computer, which runs Windows OS and which the primary network can access, is likely to be compromised.

CU's information security unit has started work for saving the network so as to avoid further attacks. The university, within one missive through its regular online site and its Facebook section, cautioned that the network required getting lesser traffic so users should avoid operating Microsoft Windows computers presently and even keep them switched off.

The department in reference to the possible compromise cautioned that computer users might find ransomware messages popping up making payment demands in Bitcoins.

It is as well the most recent ransomware assault aiming at big institutions. Ransomware refers to one kind of malware which doesn't let an end-user access his PC till he makes a payment. Ottawacitizen.com posted this, November 29, 2016.

In its statement, the university said that end-users must overlook all messages suggesting they make a payment while they should report those messages at This e-mail address is being protected from spambots. You need JavaScript enabled to view it or ext.3700 of the CCS Help Desk.

David Kenyi who's one voluntary worker with International Students Service Office stated that he received one notification about the system closure on his mobile. University spokesman Chris Cline stated it couldn't be clearly said who was responsible for carrying out the hack. While he said with certainty that hackers had demanded payment, he could not say the amount.

According to threat intelligence and cyber-security consultant Cheryl Biswas at KPMG, through ransomware assaults, attackers grab on others' cash. The money making method is superbly easy for them.

The university further stated that the division of information security within the department of computing and communication services had engaged experts to evaluate the situation while adopt measures for making the network secure.

As per Ms. Biswas, the most appropriate safeguard vis-à-vis ransomware assaults was for making sure PCs had their security patches up-to-date. Her additional recommendation was that users perform frequent back-ups in order that their systems could be retrieved in case of an attack.

Read more... - CU Cautions Inmates ...
 
DMARC Helps HMRC in Blocking 300 Million Phishing Emails PDF Print E-mail
Written by Administrator   
Friday, 02 December 2016 08:00


Last year, taxpayers in UK are hit by phishing emails of around half billion. However, HMRC is saying that they have made massive progresses to protect them by moving on to DMARC.

HMRC is first department of government who implement fully DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol. DMARC implementation is compulsory for the public sector bodies as a part of active cyber defense programme, which is led by NCSC (National Cyber Security Centre) of UK.

In September, Infosecurity reported that GDS (Government Digital Service) of Cabinet Office's just mandated that strongest DMARC policy as default for the email services from October 1st.

The DMARC protocol helps to protect against spam and phishing by authenticating the incoming email. Infosecurity-magazine.com posted on November 28th, 2016, that by using DMARC, HMRC so far this year has blocked 300 Mn phishing emails as explained by Ed Tucker, Cybersecurity Head.

It is largely focused on fixing underlying infrastructure protocols, finding and then blocked the malicious activity, improving the email security, filtering out the malicious domains, helping the government and important national infrastructure improve the security practices, as well as encouraging new ways for online authentication.

The NCSC expects that all departments will run DMARC protocol without delay for removing malicious emails which appear to have come from the government.

For making phishing emails of HMRC look more genuine, the criminals usually spoof, or else masquerade, as genuine domains of HMRC, most of the times @HMRC.gov.uk. Tucker said that the cyber security team of HMRC was working for tackling the issue by "gradually implementing security controls across all of our email domains".

Cabinet Office mandated for all the government sites to use HTTPS and HSTS, in an effort to help protecting against the Man in the Middle and various other attacks.

However, there is still more work to perform inside the government for improving cybersecurity. They replied to over 3 lac phishing referrals of customers. They have also instigated takedown of over 14,000 fake websites, which were trying to gather customer data.

The NAO (National Audit Office) slammed "chaotic" approach of Whitehall by arguing that several bodies are there with the overlapping security responsibilities, which causes difficulty in finding where to go for the advice.

Read more... - DMARC Helps HMRC in ...
 
iCloud Calendar Junk E-Mail Increasingly Becoming Common PDF Print E-mail
Written by Administrator   
Friday, 02 December 2016 08:00


Users of Apple iCal were recently hit with one especially infuriating and quite truly imaginative kind of spam that contained invites to sales incidences such as of 'Value Brand' glasses costing a thrifty 19.99 alongside one web-link embedded below. Victims got one electronic mail regarding the invite inside e-mail account of their iCloud service; as well as viewed it within iCal pop-ups that appeared on their PC screens, while even occasionally received prompts regarding the inexpensive Oakleys on the iPhones they owned.

To not receive these invites actually poses problem difficult to avoid since rejecting them dispatched one missive back to spam mailers substantiating that the iCloud A/C which they attacked was in fact active thereby inducing the dispatch of more spam mails. To not receive the undesirable alerts involves certain multi-step maneuver; however, stopping them wholly merely involves one lone alteration of iCloud settings.

Users of iOS device with Calendar application are considered fortunate if they don't get one spam invite like the above. For, these infuriating invites for attending sales events of Black Fridays are currently getting more-and-more common, and in the form of pop-up notifications onto Macs and iOS devices in the accompaniment of web-links to fraudulent sites. Bgr.com posted this online dated November 28, 2016.

The sales events invite spam contains one web-link within the event depiction. Earlier bulks attempted at duping recipients into going to DHL as well as other websites. Contrarily though, the present spam is created for luring unsuspecting end-users into pursuing it over certain deal. Pursuing or following the invite enables to reply with Decline, Accept, else Maybe. Nevertheless, it is immaterial whichever is clicked the reply goes back to person inviting that is sure to start off fresh spam.

Disturbingly, opting for any of the three just indicates to the spam mailer the active state of the A/C while prepare to send more undesirable invites. Therefore, it's advisable that end-users go for the alternative technique to trash the spam invites entirely from their iOS appliances.

Significantly however, Apple can determine one method for stopping the kind of bulk invites through iCloud.

Read more... - iCloud Calendar Junk...
 
Hack Suspected as Deutsche Telekom Customers Fail to Access Internet PDF Print E-mail
Written by Administrator   
Thursday, 01 December 2016 08:00


As per the Deutsche Telekom, a potential hack on Sunday afternoon, November 27, has affected some 900,000 Internet users working with specific router brands even as a few couldn't access the Net at all whilst many encountered irregular problems.

Speaking to AFP, one spokesman from Telekom said that the company was sure about some external influence compromising the routers with the aid of software that was planted on the gadgets which didn't allow the access to Telekom's network. The spokesman refrained from delineating the router brands that were impacted.

A router is referred to network hardware which individual consumers use to access their telephone/Internet/television service providers. Elaborating upon the problem, the spokesman said it wasn't just with network access, however, also with recognizing which routers were failing following dial-up.

Deutsche Telekom said that they were currently examining the clue that IT analysts had unearthed about the access issue being because of an external assault instead of one usual system failure. Thelocal.de posted this dated November 28, 2016.

Telekom informed that it was bringing in fresh software the day after the hack, expecting it'd resolve the issue, because customers, one of them The Local, couldn't even then connect as Monday began.

The company noted that it had engaged engineers as well as colleagues belonging to firms providing the routers to keep trying Sunday night for some solution. However, consumers impacted have been urged for taking their gadgets off Telekom's network for the time being.

During September this year, a number of political parties received bogus e-mails masquerading as NATO messages; nonetheless, they actually had web-link to plant spyware onto victims' PCs.

Earlier during 2015, the Bundestag became victim of hack which security services said originated from Russia. Meanwhile Germany, to have its national elections in autumn 2017, had been earnestly following the effect of exposed confidential files, which hackers acquired, on 2016 presidential elections in USA.

United States officials blamed Russia as maneuvering the leakage of electronic mails from the DNC servers. A cyber assault during October too caused inaccessibility of much of the American Internet to several million end-users globally.

Read more... - Hack Suspected as De...
 
The Image that One Downloaded from LinkedIn, Facebook could be Malicious Software PDF Print E-mail
Written by Administrator   
Thursday, 01 December 2016 08:00


Check Point the security outfit says that no longer are only malware, Trojans and viruses shady programs online for what appears as innocuous photos and images too are now crafted as malicious programs. One such definite instance is with "ImageGate" as the software laboratory recently named, explaining that there must be a 'gate' for everything.

It isn't necessary that malware attacks a user's PC via OS-based exploits or Web-browser. At times, the social-networking websites too may pose the problem. Check Point's security investigators recently detected that the Locky ransomware was piggy-backing on loopholes in the manner LinkedIn along with Facebook, in particular, besides others, treat images so as for tainting one's computer. The trick compels the infected user's Web-browser to pull down one dangerously-coded picture file which compromises the machine immediately when it's clicked. Consequently, all files become encrypted till the time the user pays up.

The disturbing part of this kind of assault simply involves the huge number of people who could be victimized. No matter whether one's security is the maximum and his brain too didn't think of opening the file, he could by force of habit click on it. Hothardware.com posted this dated November 27, 2016.

On opening the dangerously-coded picture file, end-users could have their computers compromised as also files encrypted, while for decrypting them, the hapless persons must make ransom payments of $365 or Pounds 294. Earlier during February, Lawrence Abrams a security researcher cautioned that whilst Locky encrypted and locked any file, its name would be changed to a new format i.e. [unique_id][identified].locky; thus whilst test.jpg was locked via encryption, its name would be changed and become something as F67091F1D24A922B1A7FC27E19A9D9BC.locky. There would also be the distinct ID as well as other info within the particular encrypted file's tail.

Now, one can solely eschew the real 'Locky' malware that is there since nearly twelve months, by remaining wary of it while never clicking on the file. Unfortunately, most often, browsers of social networks repose faith in them and do not perceive that they invite hackers in the process who abuse vulnerabilities within these Internet sites.

Read more... - The Image that One D...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1469
Polls
The Spamproblem is
 
Who's online
We have 67 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us