Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Critical Data Related to Malaysian Airlines Flight MH370 Lost to PC-Hackers PDF Print E-mail
Written by Administrator   
Monday, 01 September 2014 11:00

PC-attackers reportedly seized critical information stored on networks of Malaysian officers associated with the search to locate the flight MH370 of Malaysian Airlines gone missing since long now, published vpncreative.net, August 21, 2014.

Government officials in Malaysia said that the attackers wanting to get data pertaining to the probe vis-à-vis MH370 carried out the hack. They launched the assault 9th March 2014, one day following MH370 flight's disappearance when it was heading towards Beijing from Kuala Lumpur.

It was through a report that 'The Star,' a daily in Malaysia, published that it became apparent how an advanced form of virus inside one news file landed inside the Malaysian officers' inboxes.

The Boeing airbus no. 777 had 239 individuals inside it at the time it lost contact. On March 8, 2014, Flight MH370 just disappeared around 45 minutes from the time it took off. Among the people aboard, 152 passengers belonged to China. China showed an immense interest all through from the start of the probe as also in the ongoing disagreements between nations regarding the lost plane. Formerly, the country greatly criticized the manner in which Malaysian authorities were handling the catastrophe. Its hostile articulations angered both Malaysian authorities and civilians.

The attack that used a virus at first came to the notice of CyberSecurity Malaysia an agency of the Ministry of Science, Technology and Innovation.

Dr. Amirudin Abdul Wahab, Chief Executive of CyberSecurity Malaysia said that his agency got reports from its administration informing that overwhelming outbound e-mails clogged their network. Dailymail.co.uk published this, August 20, 2014.

Wahab continued that the e-mails carried secret files such as classified documents and minutes-of-meetings originally on the officials' PCs. With a well-designed virus, undetectable to AV programs, the attack was extremely sophisticated, he noted.

Experts tracked down the hack to certain Internet Protocol address within China; however, they've provided no further information.

Both Police and CyberSecurity Malaysia are conducting the investigation together with Interpol.

Meanwhile, more news about the hack arrive ever-since Tony Abbott, Prime Minister of Australia stated that one fresh search underneath the sea could fairly help find the missing aircraft. Dailymail.co.uk published this.

Read more... - Critical Data Relate...
 
Kelihos Botnet Being Expanded, Warn Security Researchers PDF Print E-mail
Written by Administrator   
Monday, 01 September 2014 11:00

According to security researchers, the Kelihos botnet is yet being expanded as cyber-criminals include more-and-more PCs into it; reported Help Net Security, August 25, 2014.

A unique strategy is being tried: the bot-masters pretending to be programmers from Russian community make an appeal towards invoking the patriotic feeling of Russian users who're then made to take down software which apparently clandestinely hacks into government websites belonging to nations which recently isolated Russia from their aid programs.

Security experts from the solutions offering company Websense for protection of organizations against Internet assaults as well as data theft determined that the web-link embedded on the spam mail in reality serves the Kelihos Trojan that traps infected PCs into the botnet.

Known with another name Hlux, the Kelihos has myriad capabilities like spewing junk e-mails, filching sensitive information, mining Bitcoins, stealing Bitcoin wallets as well as engaging the infected PCs for executing DDoS (Distributed Denial-of-Service) assaults.

Albeit there have been several shutdown operations on Kelihos botnet by private security firms and law enforcement, still the Kelihos proved resilient and built fresh botnets.

Websense telemetry indicates that barely have the website harboring Kelihos Trojan been accessed; therefore, the current spam operation is likely an effort towards re-constructing the malicious network.

According to Websense researchers, the current incident is differently framed in that it doesn't incite the inquisitive feeling of victims rather invokes their patriotic sentiments. It bluntly states that malicious software would be activated on the users' PCs, however, doesn't reveal what the software would actually do, they explain. Help Net Security published this.

A few e-mails have varied texts, while sometimes recipients are suggested to disable their anti-virus programs whilst executing the software, Websense observes, adding the company is certain about the assault's starting date as 20th August 2014.

Ran Mosessco, Senior Security Researcher at Websense indicates that the sample e-mails which have been assessed till now appear as featuring sniffing and spambot malware, with little DDoS condition seen during initial assessment. Still, organizations letting execution of the malware on their infrastructure could have considerable damage like facing blacklisting, he contends. Securityweek.com published this, August 25, 2014.

Read more... - Kelihos Botnet Being...
 
New Phishing Campaign Seeks Account Credentials of Apple Users PDF Print E-mail
Written by Administrator   
Saturday, 30 August 2014 19:00


According to security researchers, cyber-criminals are unyielding as they keep garnering account credentials related to various Internet services, and currently, they are executing a robust phishing e-mail scam aimed at users of Apple the software giant, reported softpedia.com dated August 22, 2014.

Typically, the e-mails are spoofed and this time they impersonate Apple using its supposed e-mail id This e-mail address is being protected from spambots. You need JavaScript enabled to view it while issuing alert messages for recipients telling them they require validating their account credentials by logging into the same.

The complete fraud gets the look of security verification, while in case end-users overlook it, they would face suspension of the Apple ID assigned to them. Scammers use this as one usual trick which makes the message seem urgent as also raises the number of successful attempts during the phishing scheme.

Essentially, the message body ends with a web-link supposedly leading onto Apple's site that asks for the end-user's particulars necessary to complete the account verification.

In addition to asking the username and password of the user's Apple account, the phishing site directs him to provide his full name along with birth date; details of credit card such as CVV, number, 3D-secure particular and expiration date; address; driver license code as well as replies to security queries. These information land up with the cyber-crooks who could use the same to commit identity theft vis-à-vis the victim.

Disturbingly, Apple has had such attacks from online miscreants previously too. Indeed, because of these recurrent e-mail scams against Apple, the company as well as security specialists have recommended certain security suggestions for the Apple users.

One, they must be wary of dubious e-mails. In case an e-mail received talks about suspension of the recipient's Apple ID alternatively asks him for making his information up-to-date, he mustn't open the web-link given inside the e-mail rather he should go to his Web-browser and access apple.com for the action.

Two, users should activate the 2-step validation to access their Apple ID. Then, suppose their Apple ID gets stolen, the phishers would not be able in logging into their accounts devoid of being in physical control of their devices or mobile-phones.

Read more... - New Phishing Campaig...
 
POS System of Mizado Cocina Infected by “Backoff” Malware PDF Print E-mail
Written by Administrator   
Saturday, 30 August 2014 19:00


Softpedia.com reported on 21st August, 2014 stating that Mizado Cocina restaurant in New Orleans (United States of America) found their payment systems leaked debit and credit card information to an unknown imposter who is using the Backoff Point-Of-Sale (PoS) malware.

The restaurant came to know about this only when a third-party forensic investigation company informed them on 31st July, 2014 that an attacker installed malicious software on their systems to try to steal information about their customer's credit card.

Earlier also the restaurant observed signs of intrusion as clients reported fake transactions soon after dining at Mizado Cocina.

It became clear after forensic investigation that the payment systems had been infected with malicious software and the hardware was replaced.

The breached system was analyzed and it was revealed that around 8,000 cards of individuals were impacted which were processed by the infected PoS between 9th May and 18th July.

The restaurant announced publicly that the names, card numbers, CVV security codes and expiry dates of customers were compromised during the incident.

It is RAM (Random-Access Memory) scraper which is a part of a new malware family Backoff which can capture data stored in memory. It can log keystrokes and collect details of payment card stored in memory immediately when it is swiped and before encryption of the information. Researchers and law enforcement authorities first encountered Backoff in October 2013 but most major antivirus tools did not detect it till then.

The restaurant claimed to contact and request those customers who dined between the given time-frame (9th May to 18th July, 2014) to review their account statements and notify credit card companies and monitor credit reports to prevent theft of identity.

Nola.com published news on 19th August, 2014 quoting news release of Chris Rodrigue, CEO of Taste Buds Management which operates Mizado Cocina as "As per the advice about security compromise of our point of sale system, we have been working continuously with the credit card processors, appropriate law enforcement authorities and forensic experts to investigate the security compromise to ensure protection of debit and credit card information of our guests.

Read more... - POS System of Mizado...
 
With US Colleges Re-Starting Session, Cyber-Criminals Once Again Get Active; BitSight PDF Print E-mail
Written by Administrator   
Saturday, 30 August 2014 19:00


BitSight Technologies the security rankings issuer has just published a report that claims online criminals are returning with their malicious activities when college students in USA prepare to attend classes, reported nbcnews.com, August 21, 2014.

Evidently, institutions of higher learning go through a wave of sinister cyber-assaults throughout the academic period.

However, the worst thing observed is that the majority universities don't have proper equipments for stopping or dealing with such assaults that as per the report, leads to their rankings within cyber-security lower than those of healthcare as well as retail, the twin segments that experience almost constant security assaults with frequent successful hacks.

Most assaults that colleges and universities encounter result from malware contaminations. Recalling attacks by a Trojan virus that compromised Apple PCs while seized sensitive private data through masking of the malware like some browser plug-in, a similarity can be noticed with colleges getting targeted with mostly such Trojan-like malicious programs.

Other most common malicious software discovered on university or college computers are Adware -malware which attacks end-users via online ads. Conficker is yet another stubborn malware, a kind of PC-worm which compromises Windows OS of Microsoft.

The report indicates that universities become so frequent targets of cyber-assaults since they possess an enormous repository of personal as well as other personal information that include from Social Security Numbers and addresses to intellectual property and credit card details. Accordingly, hackers who fast discern the feeble IT systems the institutions maintain for data protection, exploit the situation.

As per CTO and Founder Stephen Boyer of BitSight Technologies, institutions of higher learning frequently and without difficulty get targeted with malicious software as students lack essential central security arrangement similar as within the corporate. SCMagazine.com published this, August 21, 2014.

Boyer explains the above means probable risk to pupils' data followed with intellectual property too, stored inside computers, which could have vital research material.

He adds that schools, nevertheless, ranked top for security, employed an information security director or CISO. Moreover, even though the complete sector of education is not doing well, evidences do arise of educational institutions which are indeed prospering, he concludes.

Read more... - With US Colleges Re-...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1178
Polls
The Spamproblem is
 
Who's online
We have 26 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us