Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

BLOG
Unfortunately MH17 Crash Being Leveraged by ‘Click Fraudsters’ PDF Print E-mail
Written by Administrator   
Wednesday, 30 July 2014 17:00

Canberratimes.com.au published news on 21st July, 2014 stating a warning by Internet security experts as "so-called "click fraudsters" are exploiting the MH17 tragedy to collect heavy amount of money through lucrative Internet scams."

It is happening due to crash of a Malaysian Airlines Flight 17 which was apparently shot down over Ukraine on 17th July, 2014 on its way to Kuala Lumpur from Amsterdam with 298 people on board who were all killed.

There have been news of setting up of scandalous Facebook webpages using the identities of those dead that are dispensing malware to embezzle personal information, besides others redirecting people to porn websites, online gambling websites and other spam using fake headlines, as accords to Australian SCAMWatch, an organization run by the Australian Competition and Consumer Commission, published consumerist.com on July 21, 2014.

An example of bogus link headline reads: "Video camera caught the moment plane MH17 crash over Ukraine.'

Viewers are invited to watch the video of the crashing MH17.

Those types of headlines are not directing to any additional information, but instead to sex, quickly getting rich schemes, or to enterprises trading counterfeit drugs websites.

There have been fake online charity sites purporting to be collect financial help for families of those killed in the brutal air crash.

Canberratimes.com.au reported on 21st July, 2014 quoting Alastair MacGibbon, Director of University of Canberra Centre for Internet Safety, as saying "such click-fraud schemes are now common due to such major events or disasters."

He added that they were "very profitable" for criminals as they were rewarded with advertising or referral revenue for directing traffic to certain sites.

They often infected computers with malware also.

He said that crooks are quite fast these days to pick up any topical event or disaster and work out on this to earn money criminally.

This current Malaysian Airlines click bait scam is similar to a click bait scam which erupted in April 2014 on mysterious vanishing of Malaysian Airlines MH370 in mid-fight as people saw Twitter tweets, Facebook posts or email messages promising video or new information on MH370 but when clicked on the enclosed link, your computer got infected with some very nasty types of malware.

Read more... - Unfortunately MH17 C...
 
Woman Video in Facebook Scam is Really Virus, Warns BitDefender PDF Print E-mail
Written by Administrator   
Wednesday, 30 July 2014 17:00

One fresh Facebook scam, presently disseminating, disguised as a tempting female video, however, distributes one PC-virus indulging in theft of personal data, cautions BitDefender.

According to BitDefender, an online security company, Facebook members require remaining alert of a web-link, which appears as one female video, but actually delivers one PC-virus which filches personal data. The virus, understandably, is creation of cyber-criminals in Albania.

Moreover, appearing as one YouTube video, the web-link if followed takes the user onto sites which attempt at planting the malware disguised as a Flash update from Adobe.

Catalin Cosoi, Chief Security Strategist at BitDefender explains that more than 20,000 distinct URLs have been set up which divert victims onto malware-laden sites as well as a bogus tempting movie on YouTube depicting one female in front of a webcam stripping off her clothes. Theguardian.com published this, July 21, 2014.

Cosoi further says that the movie clip plays for just about two seconds for luring men watchers into clicking the web-link. The malware authors also give a false number of visits to the video suggesting that as many as 1m-or-more users watched it.

The scammers also acquired access to the keys for 60-or-more bit.ly Application Programming Interface (API) which let production of shortened web-links utilized during disseminating fraud on Facebook. The popular URL-condensing facility bit.ly has been informed regarding scammers' abuse of the same.

In the meantime, the bogus update for Flash Player in reality represents a Trojan family which BitDefender identified as Trojan.Agent.BDYV. When executed, it loads one password-protected zipped file onto the infected computer along with one .BAT file, which subsequently delivers an executable via the provision of the required password code to unzip the archive.

BitDefender further explains that as the Trojan is capable of accessing data from users' browsers, it targets twenty buddies simultaneously on Facebook and inserts advertisement facilities into their web-pages. This way the scam's longevity increases. Besides, members can't also remove the posts from their pages which spread the malevolent diversions.

According to BitDefender, the data-filching virus requires Firefox/Chrome Web-browsers to function.

In an advisory, Cosoi recommends subscribers to be careful prior to viewing Facebook videos. Besides, they must maintain up-to-date AV along with other software, while caution friends who maybe in danger of getting victimized with the said virus.

Read more... - Woman Video in Faceb...
 
An Old Man of Prescott Valley Loses More Than $8,700 in Scam Email PDF Print E-mail
Written by Administrator   
Tuesday, 29 July 2014 11:00

Abc15.com reported on 17th July, 2014 stating a warning by authorities after a man from Prescott Valley, Yavapai County, Arizona, US lost more than 8,700USD through a scam email involving a female who claimed to be stranded in Nigeria.

The Office of the Yavapai County Sheriff announced that the 64 year old victim was trying to help someone in need and electronically wired money on four different occasions.

The wife of the victim told deputies that she has just discovered the scam due to which her husband lost the money.

The man confessed that he got friendly with the "woman" from Nigeria through emails weeks before and never spoke to her as he was communicating through emails only.

The woman finally requested for money claiming that she has misplaced her passport, other personal belongings and money and hence got stranded in Nigeria.

Authorities reveal that the woman asked for money towards airfare and processing funds and in response the victim wired 1000USD to a request he received on 2nd July, 2014.

However, the victim sent more money on 5th and 6th July because the suspect kept on asking for more money.

Kpho.com published news on 18th July, 2014 quoting Dwight D'Evelyn, Officer at the Yavapai County Sheriff Office, as saying that he (victim) wired 6,000USD to a Nigerian Bank on 10th July, 2014."

D'Evelyn said that when the victim was urged to wire 4,000USD next day, he told his spouse about the liaison and the money transfers and she at once informed the sheriff's office.

D'Evelyn said that they were embarrassed by the unfortunate incident but asked the Sheriff's Office to disclose their story so that others could be careful and avoid such scams.

D'Evelyn said that they have fixed income and so it would be very difficult to bear the loss.

D'Evelyn said that such scandals are hard to probe because suspects normally use public computers in countries where involvement of law enforcement in fraud cases is not frequent.

There has been very few success in prosecuting some cases during past with the help of Interpol and federal law enforcement.

Read more... - An Old Man of Presco...
 
Approximately 500m PCs become Tainted Worldwide Annually; FBI PDF Print E-mail
Written by Administrator   
Tuesday, 29 July 2014 11:00

According to Assistant Director Joseph Demarest of Cyber Division of Federal Bureau of Investigation, industrial figures indicate that because of botnets, U.S. victims suffered losses of more than $9bn, while Internet users worldwide suffered losses of more than $110bn. Every year infections taint about 500m PCs worldwide resulting in 18 victims at every second, he adds. Help Net Security published this dated July 17, 2014.

Further Demarest says that cyber-criminals' activities impact businesses, financial institutions, governments, universities, private citizens, defense contractors, and hospitals that are then exploited for launching DDoS assaults; utilized for spam and proxy operations, for distributing malware, clandestinely collecting intelligence, launching assaults on critical servers; as well as used as arsenals during campaigns surrounding ideologies.

Referring to botnet operators' malicious task of infecting and amassing users' PCs for building spam spewing networks, Demarest boasts of FBI's collaboration with private sector alliances and law enforcement that effectively disrupted huge botnets.

According to him, FBI has by now started developing new methodologies for aiding in lessening growing botnet assaults, however, contends that there must be more convergence of agencies of law enforcement with both private and public participants for tackling the problem.

Elsewhere Demarest states that in general, FBI focuses on eliminating, lessening and stopping online crime via identifying the highly prominent criminals and then dousing the threat. The Bureau's success, he says, is possible solely via coordination between all the present and upcoming agents of its Cyber Division. Hotforsecurity.com published this dated July 17, 2014.

And through the above collaborative process, Demarest states FBI plans for executing comprehensive and aggressive policies for the threat's mitigation to be attained via joint probes as well as partnering with law enforcement, academia, industry and private entities for necessary operations.

Here Demarest outlines their latest success in taking down the Gameover ZeuS by leading a global operation during June 2014.

However, the security industry wasn't much optimistic regarding the aftermath of Gameover ZeuS takedown. It warned that henceforth botnet herders could prepare more perilous assault techniques, and that proved right, July 11, 2014, the day Gameover ZeuS network showed up with a more resilient edition.

Read more... - Approximately 500m P...
 
Experts Warn that Users of iTunes being Targeted by Fresh Phishing Campaign PDF Print E-mail
Written by Administrator   
Tuesday, 29 July 2014 11:00

Softpedia.com reported on 16th July, 2014 quoting a warning by security experts as 'spammers are presently running a campaign of phishing email targeting dupe users of iTunes software of giant Apple.'

The fake email entitled "Important message from Apple itunes!" reads:"dear Customer, Unfortunately, your online access has been blocked. It has come to our attention that your information is out of date. This requires you to verify this information for the restorer access to your account. The failure of this verification leads to the removal of your iTunes account. To verify your identity, follow the instructions below carefully."

The user is given the option of "Verify Now" in the fake email, in case he/she wants to activate his/her account instantly.

However, emails are not from Apple and cybercriminals get all information provided in response to the fake email. The fact is that Apple or any other organization does not send such emails to their customers as they never want to suspend or delete a customer's account because organizations actually would never like to lose customers.

They would send a message to users reminding them of their long absenteeism from their service if the service remains inactive.

Security experts spotted a phishing email of above type and analyzed it to detect its location of spoof website as Newark, New Jersey.

Security experts observe that this phishing email is easy to be detected because of its grammar mistakes in the poorly constructed message but others can be more successful.

Apple informs its customers through its official website that they should never provide their Apple information on any non-Apple website. Apple websites have apple.com like iforgot.apple.com or http://store.apple.com (with the exception being iCloud.com) which require Account information.

Apple suggests that if you receive a suspicious email of the above discussed type, then forward it to www.apple.com/support/itunes/store.

Moreover, this is not the first time that Apple patrons have been attacked with Apple-themed phishing email scam because security pundits spotted a scam email during June end purporting to be from the software giant (Apple) and trying to cheat consumers with unexpected iWatch and iPhone 6.

Read more... - Experts Warn that Us...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1167
Polls
The Spamproblem is
 
Who's online
We have 17 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us