Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Scam E-mails Pretend to be from Australia Post PDF Print E-mail
Written by Administrator   
Friday, 31 July 2015 07:00

Scammers are sending fake e-mails impersonating Australia Post to innocent netizens in attempts to make them pay against so-called parcel preservation, published Herald Sun dated July 23, 2015.

A sample e-mail coming to Daniel Brunning a man based in Victoria had a broken English message. It stated that Australia Post had a claim for reimbursement of AUD 1.06 per day from the user for daily preserving a parcel in his name.

Describing the situation, Mr. Brunning stated that he received the scam electronic mail at a perfect time when there was a packet he required collecting from Australia Post. Herald Sun reported this dated July 23, 2015.

With logos of Australia Post, the fake e-mail carried one web-link taking users onto a download site for certain fresh information label alternatively for entering their addresses again.

But according to Australia Post through its authorized online site, it doesn't ask consumers for sending any payment against packet pick up, for compensation towards parcel holding (like within the above stated instance of Brunning), nor make a second confirmation of address through a web-link (like within the aforementioned instance).

The Post Office, at its own end for lessening the above kind of scams, mentions online that it is wary of several e-mail scams being circulated over the recent days; therefore, it is doing what is required towards stopping them at the earliest.

Thus for those getting the above kind of scam e-mails, Australia Post suggests a few simple security measures. These are: first to delete the e-mail should anyone receive it.

Second to inform about any scam e-mail (alternatively in case user has clicked on the web-link) on Scam Watch, an online site that ACCC (Australian Competition and Consumer Commission) runs. The site gives information for small businesses and consumers regarding the ways to recognize do away with as well as report scams.

Meanwhile, cyber-criminals exploiting the name and popularity of Australia Post aren't unprecedented. Back during 2013 in the month of March, a phishing scam had targeted the same Australia Post which resulted in numerous of its followers turning into victims of those very cyber-criminals.

Read more... - Scam E-mails Pretend...
 
Three Spammers Indicted Following a Penny-Stock Spam Attack PDF Print E-mail
Written by Administrator   
Friday, 31 July 2015 07:00

U.S. Attorney Preet Bharara practicing in New York in Southern District lately declared an indictment against 3 cyber-criminals -Ziv Orenstein, Joshu.Samuel Aaron, and Gery Shalon because they effectively executed one stock spam attack, published fbi.gov, July 21, 2015.

It's said in the indictment that Orenstein, Aaron and Shalon were engaged in work with 2 entities promoting stocks from Florida and New Jersey respectively for executing certain "pump-and-dump" penny stock campaign. The three bought shares from thinly-traded firms and dispatched innumerable spam mails that suggested probable investors towards purchasing the shares so the prices would shoot up enabling the accused to then sell away the entire stocks.

The SEC (Securities and Exchange Commission) of USA filed one simultaneous legal action vis-à-vis Orenstein, Aaron and Shalon.

Being Israeli citizens, Orenstein and Shalon, who got arrested, are under the custody of Israeli Police. As per Prosecutors, USA is set to ask for the two defendants' extradition. Moreover, Aaron an American citizen residing inside Russia too would be prosecuted.

Prosecutors argue that the men earned multi-million dollars which they laundered via bank accounts that certain shell company in Cyprus held but running no real business.

According to Diego Rodriguez, Assistant Director-in-Charge at FBI, the kind of crimes, which the trio committed, are complicated as also international in form. Apparently, plentiful profit has gone for the defendants, who cheated unwitting investors for the purpose. FBI will steadfastly cooperate with its alliances both at home as well as abroad. That will make sure that U.S markets will be maintaining their integrity, while the communities are safeguarded from deceit, no matter what medium, means or scheme is used, Rodriguez explains. Fbi.gov published this.

Moreover within 2 more complaints, prosecutors from NY accused Anthony Murgio and Yuri Lebedev for orchestrating a Bitcoin exchange without license. The men, when staying inside their Florida houses, were arrested, according to Prosecutors. Advfn.com reported this, July 21, 2015.

Apparently by running Coin.mx, the duo let consumers towards inter-changing dollars with virtual currency. The twin accused let cyber-crime victims purchase Bitcoins for depositing ransoms to computer-attackers who'd hacked their PCs, thus enabling the attackers to earn money, prosecutors stated.

Read more... - Three Spammers Indic...
 
Drones Imagined as Planting Spyware from Distance onto Targeted PCs PDF Print E-mail
Written by Administrator   
Wednesday, 29 July 2015 07:00

The Intercept in one fresh report by it tells how the government has thought of one fresh method to plant spyware onto end-users' PCs viz. with the help of drone. Pcmag.com reported this, July 21, 2015.

According to electronic mails circulated internally at Hacking Team a notorious company, it had been discussing with a supplementary institute named Boeing that manufactures various kinds of unmanned systems, how a technique could be developed for contaminating PCs via drone.

The institute's blueprint explained within Hacking Team's roadmap for different projects indicates that a specialist would be handling a project related to developing one low-weight, tiny PC which will contain weaponized code while journeying on certain drone of Boeing.

Within one internally circulated e-mail, an account manager of Hacking Team says the project is possibly by utilizing one Tactical Network Injector (TNI). A laptop-based and so one tangible device, a TNI would have its operator insert the device inside the network a target is working with, often exposed Wi-Fi network inside any coffee shop or hotel. So whilst the targeted user goes online for any routine task, like downloading an application alternatively seeing a movie clip, the device would tap the resulting traffic, which however, shouldn't be encrypted, followed with inserting the weaponized code that'd clandestinely plant the spyware of Hacking Team. Firstlook.org reported this, July 18, 2015.

Expectedly, by appending to the drone one tiny network injector, the Wi-Fi network could be struck from above, alternatively from afar. There wouldn't be any need for the system mechanist towards getting close to the target physically.

Disturbingly, the mechanism's impact can be enormous, albeit it isn't clear to what extent the project has progressed.

During past few years when digital security and human rights activists discovered evidences of Hacking Team's spying software on political activists' and journalists' PCs in Morocco, Ethiopia and other countries, Hacking Team acquired notoriety. From the leaked documents reported lately, it's certain that Hacking Team traded its spyware with several nations, which had records of questionable human rights, and with US agencies too although it's yet legally controversial whether such spyware can be used in the country.

Read more... - Drones Imagined as P...
 
South Korea, Major Client of Hacking Team for Spyware PDF Print E-mail
Written by Administrator   
Wednesday, 29 July 2015 07:00

According to recent revelations from leaked e-mails, South Korea, among other countries, was a buyer of spyware that Hacking Team a notorious Italian company sold. Seoul, which historically has been practicing military dictatorship, the purchase of the spyware shows that it's yet again building police state. Wsws.org published this dated July 16, 2015.

A detailed description of various communications and sales by Hacking Team have become obtainable from the company's files that got exposed on the Internet on July 5, 2015 and which WikiLeaks the whistle-blowing site subsequently posted. The files indicated that the 5163 Army Division of South Korea (SK), during January 2012, had bought the RCS (Remote Control System) spyware while kept on making contacts with Hacking Team till January 2015. To deliver RCS onto targets' machines, pornography, poisoned documents along with malevolent web-links are combined, as per the exposed electronic mails. Programs that booby-trap on vulnerable applications can be customized and sent onto targets' PCs.

One local daily reported that the NIS (National Intelligence Service) placed one product order for purchasing the illegal software, alternatively toolkits for spyware, to send to thirty more targets during December 2012 via one area technology firm. It was a politically sensitive period when just eleven days were left for the presidential election of high competition.

Hacking Team, to contaminate PCs and smart-phones, propagated the RCS while users remained unaware of the contaminations, as well as used the System for monitoring computers, messaging applications, phone calls and more.

The powerful NIS of SK reportedly used the government's 5163 Army Division for concealing the intelligence services' overseas activities.

Soon suspicion grew on NIS that it employed the eavesdropping methodology, and the agency admitted buying of the spyware. But it explained the purchase was done for examining cyber-warfare technology in the backdrop of North Korea (NK) acquiring South Koreans' financial data via hacking approximately 25,000 phones there.

No doubt SK has been victimized with several cyber-assaults from NK during recent years, which Pyongyang however, overruled; still NIS' explanation doesn't fully remove escalated doubts that the spyware's employment for hacking might've had association with illegitimate operations.

Read more... - South Korea, Major C...
 
TeslaCrypt Ransomware Wreaking Havoc in Indian Cities PDF Print E-mail
Written by Administrator   
Tuesday, 28 July 2015 09:00

Security experts have detected one fresh variant of TeslaCrypt an infamous ransomware compromising end-user's computer till he pays money demanded as ransom. TeslaCrypt of version 2.0 belongs to an encryptor family and notoriously contaminates gamers' PCs; published The Times of India dated July 19, 2015.

Currently, TeslaCrypt 2.0 is attacking Internet-based businesses and consumers through electronic mail attachments from where the malware is unleashed for blocking end-user from accessing his system till he pays the ransom money. In case of delay in the payment, which should be in dollars, the ransom demanded gets twofold.

TeslaCrypt began contaminating computers within Southeast Asia, Europe and U.S. From there it spread across India, particularly Mumbai and Delhi. During 2015, the ransomware targeted 2 business-owners from Agra who were demanded of a $10,000-and-more ransom sum.

According to Nitin Kasan, Cyber-Cell In-Charge in Agra, during January-June 2015, there were dual instances in the city when the malicious program encrypted critical data-files of the victims followed with blackmailing them towards paying a ransom in return for decrypting those files. The Times of India reported this.

Another victim, Sandeep Gupta, owner of a company in Agra that exports handicraft items, said that during February, his e-mails and company website that had essential shopper information and transaction details became inaccessible when certain unfamiliar hacker from Nigeria blocked them. Bharatpress.com reported this, July 20, 2015.

Gupta described the hackers as forcing him towards agreeing to pay $10,000, with the message threatening that his information would be destroyed if he didn't pay. Gupta stated that he contacted the police cyber-cell of Agra for help so his e-mail account and website could be restored.

South Asia in-charge Managing Director Altaf Halde of Kaspersky Lab the first person to identify TeslaCrypt explains ransomware as a malicious program which extorts digitally. Any entity from an ordinary shopper to a small firm or giant company could be victimized with ransomware. Usually, e-mail with a picture, a zipped folder or an .exe file in an attachment is used for the attack. Opening such an attachment results in the deployment of the malware onto the end-user's computer, Halde tells. Bharatpress.com reported this.

Read more... - TeslaCrypt Ransomwar...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1296
Polls
The Spamproblem is
 
Who's online
We have 122 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us