Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

Hackers Pretending to be WHO Distributing Ebola-Themed Spam Mails PDF Print E-mail
Written by Administrator   
Thursday, 30 October 2014 08:00

According to SpiderLabs a cyber-security band, hackers, pretending to be WHO (World Health Organization) a global health agency, have launched malware-laced spam mails targeting unwitting users as they're tricked with an Ebola pandemic fright so they'd view the malicious messages, published, October 26, 2014.

Displaying a header "Ebola Safety Tips-By WHO," the malicious e-mails tell how recipients can protect themselves against the lethal Ebola virus.

The e-mails display other headings too - "So Really, How Do You Get Ebola?" "What You Need To Know About The Deadly Ebola Outbreak," "The #1 Food Items You'll Need In An EBOLA Crisis," and "Is there ANY way to cure Ebola?"

SpiderLabs also cautions about the e-mails' writings which try convincing readers towards pulling down an attached file having anti-Ebola security measures.

So one sample message that SpiderLabs's blog shows tells that the information along with preventive measures catalogued within the attachment would assist the reader as well as people around him remain protected.

It elaborates there's one epidemic of Ebola as well as diseases of other kinds at the recipients' places about these users know nothing; therefore, they should download the WHO file to get extra info regarding the way they can remain protected against Ebola as also the other preventable illnesses. The message ends with 'We care.'

But, if anyone opens the e-mail, he would download one RAR file carrying software for letting the hackers gain admission into his PC as well as its data.

The loaded malicious program would further load a Remote Access Trojan namely DarkComet that most anti-virus solutions can't detect.

The Trojan solely impacts Windows systems and not Mac computers, as these don't allow RAR file hosting that could enable spam/malware dissemination.

Meanwhile, although the campaign seems as getting quite widespread, fortunately specialists haven't still confirmed if it's any full-time scam. However, given that usernames and passwords have lately leaked from different social media websites, authorities think they should caution people early on about such dubious electronic mails. They suggest that maintaining one's security system up-to-date, while avoiding viewing any electronic mail of the aforementioned type, is the best manner for remaining secure.

Read more... - Hackers Pretending t...
Phishing E-mails Targeting Customers of Alinea Restaurant, Warn Restaurant Owners PDF Print E-mail
Written by Administrator   
Thursday, 30 October 2014 08:00

Well-known restaurant Alinea Restaurant situated inside Chicago, US has warned its customers for being watchful about scam e-mails posing as communication from it, thus published dated October 20, 2014.

One particular Facebook post that Alinea made cautions about people pretending to be restaurant employees who're sending spam mails with a Facebook message that reads there are ticket openings reserved for Alinea customers. Subsequently, the scammers direct the victimized users for sending Moneygram funds or wire money for obtaining the night out eating reservations.

By practice, patrons of Alinea make reservations through one elaborate Internet ticketing arrangement wherein prospective diners purchase their preferred reservation hour in advance of many months. As per owners, there's a trend of utilizing bogus e-mail ids by the phishing A/Cs wherein the ids have a character off from the actual id of Alinea staff.

In one missive on Facebook, Nick Kokonas, co-owner and Grant Achatz informs guests that when anyone offers online tickets for customers to buy, usually they're genuine while Alinea encourages its patrons, who've Facebook accounts to ask for such tickets, but only after confirming their authenticity by communicating with the restaurant at This e-mail address is being protected from spambots. You need JavaScript enabled to view it . Subsequently, they should visit the option for ticket delivery by accessing Alinea's ticket website. Hitherto, the majority of customers have managed in determining the scammers while Alinea has done all that's possible for eradicating them. Still, there maybe a fraudulent, phishing e-mail reaching a customer, therefore one must act cautiously, the officials conclude.

Disturbingly, it's because of the aforementioned kinds of phishing scams that there's an increase in phishing online, remark security analysts examining the bogus electronic mails.

According to them, cyber-crooks dispatch such bogus electronic mails through spamming operations believing a few Internet-users would become convinced while get definitely ensnared with the messages.

Therefore, for avoiding the kind of absurd phishing attempts, the experts suggest perusing the e-mail writer's id and determining whether it matches with the mentioned writer; if not, the electronic mail isn't real i.e., it's a fake. Secondly, users must use high-quality anti-spam and anti-phishing solutions, which would detect scam messages, even before they land inside the mailbox.

Read more... - Phishing E-mails Tar...
Targeted Assault Costing Companies Huge, Says Kaspersky PDF Print E-mail
Written by Administrator   
Thursday, 30 October 2014 08:00

One fresh survey jointly by B2B International and Kaspersky Lab conducted over 3,900 IT personnel showed that a single successful targeted assault against an enterprise could cost a huge $2.54m whereas for a small-sized business it could be $84,000, so published dated October 27, 2014.

The survey named "IT Security Risks Survey" for the current year (2014) reveals that 94% of business firms confronted one-or-more cyber-security hack during twelve months just gone by, while those confronting one-or-more targeted assault during the same period increased 3% over a 2013 survey.

Moreover as per the new study, targeted assaults' frequency by cyber-criminals changes with respect to the kind of business a company runs. Defense and government sector organizations confronted the maximum frequent targeted assaults. This is evident from 18% of those surveyed from such organizations reporting they encountered one-or-more targeted assaults.

Additional findings of the survey show that spam campaigns represented that external threat which was the maximum for organizations followed with PC-viruses, PC-worms, PC-Trojans as well as more malware, accounting for 61%, according to 64% of those surveyed. Another 38% respondents stated that they gave top priority to safeguarding their companies' confidential data from getting exposed, while 39% described targeted assaults as being the top priority for their organizations.

Researchers estimated that losses from a single hack averaged $720,000. A business firm, which encounters a data hack, in the greatest number loses information related to inside operations (43%), with client info (31%) as well as financial info (22%) following next.

Managing Director Chris Doggett for the North America Division of Kaspersky Lab bemoaned that although enterprises appeared as perceiving targeted assaults looming large on them, companies deploying an essentially strong safeguard mechanism counted frighteningly few. published this, October 27, 2014.

Doggett explained that it was amply lucid from the survey findings how enterprises now perceived targeted assaults as a big threat capable of harming them. Further, given prominent breaches occurring frequently, it was crucial that all sized businesses made safeguard of their information technology structures the greatest priority issue, particularly considering that every successful targeted assault resulted in real damages, he suggested.

Read more... - Targeted Assault Cos...
Kaspersky Intercepted a New Malware Mac OSX Ventir PDF Print E-mail
Written by Administrator   
Wednesday, 29 October 2014 10:00

Kaspersky Lab, a Moscow-based security company, says that a new type of malware has been identified which particularly targets Mac OS X machines. The malware nicknamed as Ventir contains a keylogger, Trojan and a backdoor which facilitate cybercriminals to continue to access tainted computers.

When Ventir enters in a Mac, the Trojan's "dropper" part checks to see if it contains root access to the maligned computer which is a vital decision as that influences where the Trojan can install itself. If malware gets root access then it can damage more which is why PC users, Windows or Mac, should never employ administrator-privileged accounts for net browsing.

Keylogging component of Ventir can register every key pressed on a tainted computer and send those logs to the scammers running the Trojan giving them email addresses, passwords, search history, contacts and more.

Kaspersky lab believes that Ventir Trojan or something linked might have been employed in latest thefts of data.

SecureList published news on 16th October, 2014 quoting a blog of Kaspersky's Researcher Mikhail Kuzin as "This threat (Ventir) is particularly important with respect to the latest leaks of password and databases from Yandex, Gmail and It is pretty possible that malware from the Ventir family was employed to provide databases published by cyber crooks."

Cybercriminals have turned to code which is openly available to carry out their malicious activities because either they are too lazy to produce the code themselves or it simply suits their purpose and this is the usual trend.

Malware researchers of Kaspersky have identified a modular malware for Mac OS X which relies on LogKext, an open source software package to confine user keyboard input.

Company's products detected LogKext as "not-a-virus:Monitor.OSX.LogKext.c." and hooks into the kennel of the OS to attain its purpose.

The item is a genuine file which has been discarded by its real developer and passed to a dissimilar maintainer which upgraded it to toil on OS X Mavericks (10.9); it is available free of cost by downloading from GitHub. published news on 17th October, 2014 quoting Kuzin as saying "LogKext is added to the hijacked computer only if the dropper fruitfully obtains elevated privileges to the system."

Read more... - Kaspersky Intercepte...
Phishing e-mails Bombard Customers of BT PDF Print E-mail
Written by Administrator   
Wednesday, 29 October 2014 10:00

According to security researchers, cyber-criminals are targeting UK's BT telecommunication company by sending phishing e-mails to its clients, reported in news on October 20, 2014.

Notifying about a problem that has been spotted, the fraudulent electronic mail tells the recipient (meaning the BT customer) that he requires accessing his account and providing all those inputs which are essential for resolving the issue.

Apparently, the e-mail provides a web-link that should take the end-user onto BT's login site, but, in reality, it's a phony site where if any data is entered the information effortlessly reaches the cyber crooks.

Thereafter, this stolen info becomes handy for the criminals to gain admission into the victimized user's sensitive information with which they can carry out more attacks against him in future.

Security analysts after examining one sample electronic mail from the ongoing phishing scam discovered that the bogus site was supported via certain server that was based within Atlanta (Georgia).

The scam becomes effective as the criminals attempt at making the victim panicky with a warning that incase he doesn't follow the given instructions; he could have his account deactivated or suspended.

However, the above kind of undesirable phishing e-mail assaults can be prevented if users adopt certain security tips. These are to first remain vigilant about telephone calls, e-mails or texts which sound urgent or create scare by instructing to give personal information right away, like account data, passwords and/or card numbers just as in the above instance the phishing site asks for account login credentials.

Secondly, users should pause to think prior to clicking web-links. By brushing the computer mouse on the web-link, one can check the URL address appearing inside the Web-browser's address bar. Incase it looks dubious, the web-link should not be clicked. In another way, the user can type the given URL address inside the browser and then access the website rather than follow the web-link within the e-mail.

But, suppose anyone has already clicked the web-link and then doubts the e-mail mayn't be authentic, he should immediately inform BT about the incident so the company may investigate.

Read more... - Phishing e-mails Bom...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1200
The Spamproblem is
Who's online
We have 77 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us