Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
F-Secure, - Delhi Leads in Malware Infections in 2014 PDF Print E-mail
Written by Administrator   
Friday, 06 March 2015 20:00


Ibtimes.co. reported during the last week of February 2015 stating that Finnish security firm F-Secure in its recent report "The State of Internet in India" for 2014 reveals that New Delhi houses the maximum number of malware-infected PCs and mobiles in the country and it is most vulnerable to such risks.

Ibtimes.co. reported in the last week of February 2015 quoting Amit Nath, Country Manager (India and SAARC) of F-Secure, as saying "New Delhi has become the top malicious city and hackers can attack corporates and individuals maximum in this city as compared to other cities in the country."

Nath added that governments are considering offering free Wi-Fi all over the cities like Delhi and Chandigarh and as more cities adopt W-Fi, government has to be careful because public Wi-Fi can be misused by cybercriminals. This is after the report revealed that Delhi recorded 20% PC malware infections during 2014.

F-Secure said in its report that Hyderabad (9%), Chandigarh (9%) and Chennai (7%) were the other cities where most personal computers have been affected by malware.

The report added that many malware infections in India were related to botnet. A botnet is a collection of Internet-connected programs connecting other similar programs to send spam email or participate in distributed denial-of-service attacks which allows hackers to gain control over the computer of the user.

F-Secure found that banking-related malware like Sality (14%) and Ramnit (5%) which steal banking details of users continued to top malware and primarily dispense via flash or pen drives.

Data of F-Secure revealed that maximum detections found during the last week of August 2014 and detections pertain to both consumers and companies.

Livemint.com published news during last week of February 2015 quoting Pekka Usva, Vice-President of Corporate Security of F-Secure, as saying "Inspite of decline of Conficker/Downadup, infections such as Ramnit, Virtob and Sality have continued to mark their existence in India for the last three years."

Downadup or Conficker is amongst the largest known computer worm infections tantalizing Windows OSs and it did not figure amongst the top 5 malwares in India during 2014 but it led in malware activity during 2012 with securing fourth position in 2013.

Read more... - F-Secure, - Delhi Le...
 
OECD Ruling Denounces ‘FinFisher’ Spyware PDF Print E-mail
Written by Administrator   
Friday, 06 March 2015 20:00


The well-known spying software FinFisher, which tyrants and police worldwide buy, recently got distinctly recognized as the only software that OECD judges as having crushed humanitarian rights, published theregister.com, February 26, 2015. OECD is a conglomerate of global sovereign states having significant influence.

FinFisher, its other name FinSpy, contaminates computers via exploitation of security flaws within different software, including Apple iTunes, alternatively gets planted through deceiving somebody and making him click and execute a file attached in e-mail. When installed, the spyware utilizes rootkit for remaining concealed from both anti-viruses and the PC-operator, taps communications, particularly VoIP calls for eavesdroppers, lets remote cyber-criminals control the infected computer, as well as more.

The United Kingdom agency of OECD started one probe following an accusation on the spyware-making syndicate's British division Gamma International that it sold FinFisher to Bahrain government that acted dictatorially.

An investigation during 2014 by Bahrain Watch a syndicate promoting human rights asserted that Bahrain's Mid-East region came across the spyware followed with employing it for invading computers that a three anti-government advocates' group used, letting authorities to maintain watch over the men.

These men, who were pro-democracy campaigners, had to thereafter flee to United Kingdom.

According to OECD, there aren't any internal rules with Gamma for human rights alternatively any obligatory diligence processes for ensuring the products it sells are not misused.

While OECD's judgment lacks legal conviction, it indicates that opponents of spying software are increasingly strengthening own principles as also suggests that surveillance vendors should select customers more cautiously.

According to Deputy Director Eric King of Privacy International one registered charity in UK supporting and canvassing privacy rights globally, OECD's verdict is a turning point in accepting that Gamma and other surveillance agencies cannot overlook the obligations they've for human rights. Theverge.com reported this, February 26, 2015.

King continues that the ruling reiterates it isn't just irresponsible business to supply advanced spying tools to the extremely oppressive governments, but that it defies companies' obligations too towards human rights maintenance, whilst those doing such business should take the onus of the way their products eventually get utilized. Infosecurity-magazine.com published this, February 27, 2015.

Read more... - OECD Ruling Denounce...
 
A Man in New Zealand Losses $200,000 in Fake Email Rip-off PDF Print E-mail
Written by Administrator   
Thursday, 05 March 2015 08:00

Nzherald.co.nz reported on 26th February, 2015 stating that a West Coast (New Zealand) man who has lost $200,000 in an email scam had been comprehensively trained through Internet for a long period before he was cheated of his money.

Nzherald.co.nz published news on 26th February, 2015 quoting Dan Keno, Detective Senior Sergeant of Greymouth (New Zealand) CIB (Criminal Investigation Branch) as saying "the man had reported the scam only now although it had occurred late last year."

The man who is keeping his location secret, disclosed details to the scammers after initial contact through a series of reciprocal emails.

This had made possible for scammers to contact him in manners which looked genuine including a phone number which appeared to be from Auckland.

The officer stressed that people needed to be very careful about any email or message received from unknown person or source.

Stuff.co.nz published news on 25th February, 2015 quoting Mr. Keno as saying "Anyone giving an offer involving some financial gain for you may be a scammer. Unfortunately, they target trust and the greed of the people. No one can win million dollars in a lottery in which one did not participate and the Nigerian Bishop who wants to deposit his fortune in your account actually does not exist also.

Scammers used post, email, text messages and social networking along with any other suspicious communication should be reported to the Department of internal Affairs.

He said that many scams looked genuine.

He said that it was very unlikely that a victim of this scam would get their money back.

Experts analyzed the scam email and commented that it is important to be aware of the different types of scams going around especially if you use email or mobile phone because scammers will do anything to rip you off.

You should never open emails which come from unknown or suspicious source and if an email asks for personal information, then never give in. If an email contains a link, hover your mouse on it to find if it relates to the email. Experts stressed recommending some simple tips like always try to verify the authenticity of any email by independent means (like in the above case).

Read more... - A Man in New Zealand...
 
Europol Terminates Notorious Ramnit Botnet PDF Print E-mail
Written by Administrator   
Thursday, 05 March 2015 08:00

The Ramnit network-of-bots, which cyber-thugs popularly leveraged for committing financial fraud is finally in a dismantled state via a combined initiative that EC3 (European Cybercrime Center) of Europol spearheaded, published threatpost.com dated February 25, 2015.

Lately EC3, also recognized as police agency of Europe, stated that investigators from different European countries, together with Symantec, AnubisNetworks as well as Microsoft performed the dismantling job that cracked the botnet's C&C structure followed with diverting all traffic originating out of 300 domains, which Ramnit utilized, onto domains that officials controlled.

The Ramnit, according to EC3, infected over 3.2m Windows PCs.

The modes through which the malware was disseminated included drive-by downloads, phishing scams and spam campaigns. These attacks lured victims towards unknowingly loading the program. That subsequently helped the attackers gain admission into the contaminated PCs from where they stole chiefly banking credentials. However, they even stole FTP log-ins, social-networking A/C passwords etc. Immediately after gaining backdoor access to a PC, the malware tried identifying the AV programs active on that compromised system and disabling the software's detection capabilities.

Disturbingly, Ramnit has contaminated PCs globally and the nations worst impacted are Bangladesh, USA and India. It targeted more countries such as Turkey, Egypt, UK, Pakistan and Philippines, amidst others.

In a remark, Wil van Gemert Deputy Director Operations of Europol said that the success of the dismantling operation indicated how important global law enforcement was when carrying out their tasks along with private players for combating the worldwide danger that Internet crime posed. According to him, Europol would keep its efforts on for terminating botnets as well as destabilizing their central infrastructures that crooks employed for executing various cyber-crimes. The agency, in combination with member states of European Union and alliances worldwide, aimed at safeguarding people globally from the above kind of criminal activities, he concluded. ZDNet.com published this, February 25, 2015.

Currently after the shutdown operation, investigators would examine the confiscated C&C servers while locate their operators too. And if no detention of the criminals happens, the Ramnit owners would keep doing the crimes and possibly even establish new infrastructures for capturing more banking credentials, analyzed the investigators.

Read more... - Europol Terminates N...
 
Brazilian Internauts have Cyber-Crooks Compromise their Internet Connections PDF Print E-mail
Written by Administrator   
Wednesday, 04 March 2015 08:00

According to Proofpoint, cyber-criminals by altering the DNS (domain name system) configurations within Internauts' routers in Brazil have been getting hold over such users' online connections recently.

The operations, which are described as pharming assaults, entice victims towards accessing fraudulent websites that normally resemble banking sites within attempts to grab sensitive information such as bank log-in credentials.

Pharming assaults have proved as extremely successful since often they're hard to recognize. In these, the assaulters by changing domain name system configurations in routers make sure that end-users land on a fake website soon as they enter a genuine website's domain name inside the address bar of their browsers. Normally, network-based assaults are the means for compromising the DNS; however, during one recent scam, phishing e-mails too proved successful.

It was during mid-December 2014 when Proofpoint began closely watching the campaign. The company researchers note that a spam mail was involved that seemingly arrived from a major telecommunication company of Brazil. They saw one small-scale spam outbreak running for 4 weeks when close to 100 spam messages were distributed primarily to organizations and individuals in Brazil.

A URL inside those spam mails diverted victims, who followed it, onto web-pages which leveraged cross-site request forgery (CRF) for attacking routers, illegitimately cracking log-in page of the admin via the dispatch of HTTP requests to it till finally the victim entered the right identifiable details.

The attackers used one backup service too that they created for the DNS (domain name service) belonging to them for utilization within the assault whose function began when the main malevolent DNS got disturbed for eschewing any suspicion by the victim.

When receiver of the phishing e-mail followed the web-link while there would occur successful exploitation of the vulnerability, all PCs connected to the compromised router would apparently experience them requesting one malevolent DNS server for seeking hostname of no particular one, online, the security company explains.

With carrying out the attack effectively, it was now possible for the hacker towards intercepting the online conversations, enabling them to gain hold over confidential data, particularly from websites, e-mail communications, along with passwords and logins.

Read more... - Brazilian Internauts...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1244
Polls
The Spamproblem is
 
Who's online
We have 29 guests and 2 members online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us