Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

BLOG
Ebola Emerging as a Grave Computer Threat - Symantec PDF Print E-mail
Written by Administrator   
Tuesday, 02 September 2014 07:00

Security experts of security firm Symantec claim that Ebola is a diverse type of virus which is contaminating computers and networks instead of human bodies and it has emerged as a serious threat.

Especially, Ebola is a deadly uncommon virus which causes bleeding inside and outside the human body and its epidemic outbreak in West Africa has hit every news channel all over the world.

Security firm Symantec has warned everyone saying that phishing attacks and malware purporting to be Ebola alerts are surging.

According to Symantec, online attackers are exploiting the name of UAE's (United Arab Emirates) well-known telecom giant Etisalat with footprints in 18 countries across Asia, Africa and Middle East to enter the computers of innocent users.

Symantec alerted that first attackers send a fake email with a phony report about Ebola virus to lure users but user's systems actually get infected with Trojan.Zbot malware.

The security firm said that in the second operation, cyber crooks send an email which impersonates Etisalat. The email asserts to hold a high-profile presentation about Ebola virus with ZIP file attached to it and entitled as: "EBOLA - ETISALAT PRESENTATION.pdf.zip" but in reality it executes Trojan.Blueso on the computer of the victim.

This malware infects Web browser of the user with W32.Spyrat.

Spyrat does as per its name: it logs keystrokes, grabs screenshots, records from webcam, enumerates, opens web pages, uploads and deletes folders and files, gathers details of applications, OS and the computer.

It is unfortunate that phishers always look for an opportunity whenever something happens in the world such as the recent Malaysian Airlines tragedies which shook the entire world, Luis Suarez' famous World Cup champ (2014) biting incident, the unfortunate death of well-known Hollywood stalwart Robin Williams and others like Amy Winehouse, Paul Walker and now....the Ebola hemorrhagic virus.

Symantec advised users with some time-tested steps to remain safe and secured: "It advises all Internauts to be careful of unforeseen, unwanted or suspicious emails. If you are doubtful about legitimacy of the mail then don't revert to it and don't click on links it contains and open attachments in the message."

Read more... - Ebola Emerging as a ...
 
Experts - Cybercriminals Target European Automakers with Malware PDF Print E-mail
Written by Administrator   
Tuesday, 02 September 2014 07:00

Csoonline.com reported on 25th August, 2014 quoting a recent warning of security researchers as "cybercriminals are using a new information-stealing malware program to target companies of the automobile industry in Europe.

The cyber crooks dispensed their malware through spear-phishing electronic mails impersonating Technik Automobile which was looking to purchase second-hand and pre-owned vehicles. The emails had an attached ZIP file called TechnikAutomobileGMBH.pdf.zip which was purportedly a log of vehicles but actually had a Trojan program known as Carbon Grabber which was detected by Symantech as Infostealer.Retgate.

The tainted file shall decrypt another executable from its own self and inject code into Internet Explorer, Microsoft Outlook, Mozilla Firefox and Google Chrome processes on the hijacked computer.

The Trojan hooks the browser APIs permitting it to embezzle data ahead of its encryption and being sent to network. For example, stolen information may include password and user name for Outlook and other information for online banking or internal Web applications which are entered by the user to log into services.

Man-in-browser (MitB) technique intercepts all data and then delivers to a command and control (C&C) server.

Symantec has revealed that not only automobile businesses are targeted by the attackers as it has registered infections on machines used in public services (13%) and also in charity works and financial sector (9% in both cases).

However, the security company observed that Carbon Grabber affected most of the victims (48%) who are familiar with services like commercial transport, car rental and the secondary market for agricultural and commercial vehicles.

Securityweek.com published news on 25th August, 2014 quoting Lionel Payet, Threat Intelligence Officer of Symantec, as saying "It is not yet confirmed that crooks operating the Technik Automobile spam email campaign are entirely financially motivated. We are sure that if the assault is successful, the attackers will get foothold in the business of the victim."

It is not surprising that companies in the automobile industry are targeted more considering it's wealthy sector. However, corporate networks are not the only elements to be protected against cyber attacks as recently many security researchers have warned about hacking of computer systems powering modern cars.

Read more... - Experts - Cybercrimi...
 
Critical Data Related to Malaysian Airlines Flight MH370 Lost to PC-Hackers PDF Print E-mail
Written by Administrator   
Monday, 01 September 2014 11:00

PC-attackers reportedly seized critical information stored on networks of Malaysian officers associated with the search to locate the flight MH370 of Malaysian Airlines gone missing since long now, published vpncreative.net, August 21, 2014.

Government officials in Malaysia said that the attackers wanting to get data pertaining to the probe vis-à-vis MH370 carried out the hack. They launched the assault 9th March 2014, one day following MH370 flight's disappearance when it was heading towards Beijing from Kuala Lumpur.

It was through a report that 'The Star,' a daily in Malaysia, published that it became apparent how an advanced form of virus inside one news file landed inside the Malaysian officers' inboxes.

The Boeing airbus no. 777 had 239 individuals inside it at the time it lost contact. On March 8, 2014, Flight MH370 just disappeared around 45 minutes from the time it took off. Among the people aboard, 152 passengers belonged to China. China showed an immense interest all through from the start of the probe as also in the ongoing disagreements between nations regarding the lost plane. Formerly, the country greatly criticized the manner in which Malaysian authorities were handling the catastrophe. Its hostile articulations angered both Malaysian authorities and civilians.

The attack that used a virus at first came to the notice of CyberSecurity Malaysia an agency of the Ministry of Science, Technology and Innovation.

Dr. Amirudin Abdul Wahab, Chief Executive of CyberSecurity Malaysia said that his agency got reports from its administration informing that overwhelming outbound e-mails clogged their network. Dailymail.co.uk published this, August 20, 2014.

Wahab continued that the e-mails carried secret files such as classified documents and minutes-of-meetings originally on the officials' PCs. With a well-designed virus, undetectable to AV programs, the attack was extremely sophisticated, he noted.

Experts tracked down the hack to certain Internet Protocol address within China; however, they've provided no further information.

Both Police and CyberSecurity Malaysia are conducting the investigation together with Interpol.

Meanwhile, more news about the hack arrive ever-since Tony Abbott, Prime Minister of Australia stated that one fresh search underneath the sea could fairly help find the missing aircraft. Dailymail.co.uk published this.

Read more... - Critical Data Relate...
 
Kelihos Botnet Being Expanded, Warn Security Researchers PDF Print E-mail
Written by Administrator   
Monday, 01 September 2014 11:00

According to security researchers, the Kelihos botnet is yet being expanded as cyber-criminals include more-and-more PCs into it; reported Help Net Security, August 25, 2014.

A unique strategy is being tried: the bot-masters pretending to be programmers from Russian community make an appeal towards invoking the patriotic feeling of Russian users who're then made to take down software which apparently clandestinely hacks into government websites belonging to nations which recently isolated Russia from their aid programs.

Security experts from the solutions offering company Websense for protection of organizations against Internet assaults as well as data theft determined that the web-link embedded on the spam mail in reality serves the Kelihos Trojan that traps infected PCs into the botnet.

Known with another name Hlux, the Kelihos has myriad capabilities like spewing junk e-mails, filching sensitive information, mining Bitcoins, stealing Bitcoin wallets as well as engaging the infected PCs for executing DDoS (Distributed Denial-of-Service) assaults.

Albeit there have been several shutdown operations on Kelihos botnet by private security firms and law enforcement, still the Kelihos proved resilient and built fresh botnets.

Websense telemetry indicates that barely have the website harboring Kelihos Trojan been accessed; therefore, the current spam operation is likely an effort towards re-constructing the malicious network.

According to Websense researchers, the current incident is differently framed in that it doesn't incite the inquisitive feeling of victims rather invokes their patriotic sentiments. It bluntly states that malicious software would be activated on the users' PCs, however, doesn't reveal what the software would actually do, they explain. Help Net Security published this.

A few e-mails have varied texts, while sometimes recipients are suggested to disable their anti-virus programs whilst executing the software, Websense observes, adding the company is certain about the assault's starting date as 20th August 2014.

Ran Mosessco, Senior Security Researcher at Websense indicates that the sample e-mails which have been assessed till now appear as featuring sniffing and spambot malware, with little DDoS condition seen during initial assessment. Still, organizations letting execution of the malware on their infrastructure could have considerable damage like facing blacklisting, he contends. Securityweek.com published this, August 25, 2014.

Read more... - Kelihos Botnet Being...
 
New Phishing Campaign Seeks Account Credentials of Apple Users PDF Print E-mail
Written by Administrator   
Saturday, 30 August 2014 19:00


According to security researchers, cyber-criminals are unyielding as they keep garnering account credentials related to various Internet services, and currently, they are executing a robust phishing e-mail scam aimed at users of Apple the software giant, reported softpedia.com dated August 22, 2014.

Typically, the e-mails are spoofed and this time they impersonate Apple using its supposed e-mail id This e-mail address is being protected from spambots. You need JavaScript enabled to view it while issuing alert messages for recipients telling them they require validating their account credentials by logging into the same.

The complete fraud gets the look of security verification, while in case end-users overlook it, they would face suspension of the Apple ID assigned to them. Scammers use this as one usual trick which makes the message seem urgent as also raises the number of successful attempts during the phishing scheme.

Essentially, the message body ends with a web-link supposedly leading onto Apple's site that asks for the end-user's particulars necessary to complete the account verification.

In addition to asking the username and password of the user's Apple account, the phishing site directs him to provide his full name along with birth date; details of credit card such as CVV, number, 3D-secure particular and expiration date; address; driver license code as well as replies to security queries. These information land up with the cyber-crooks who could use the same to commit identity theft vis-à-vis the victim.

Disturbingly, Apple has had such attacks from online miscreants previously too. Indeed, because of these recurrent e-mail scams against Apple, the company as well as security specialists have recommended certain security suggestions for the Apple users.

One, they must be wary of dubious e-mails. In case an e-mail received talks about suspension of the recipient's Apple ID alternatively asks him for making his information up-to-date, he mustn't open the web-link given inside the e-mail rather he should go to his Web-browser and access apple.com for the action.

Two, users should activate the 2-step validation to access their Apple ID. Then, suppose their Apple ID gets stolen, the phishers would not be able in logging into their accounts devoid of being in physical control of their devices or mobile-phones.

Read more... - New Phishing Campaig...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1179
Polls
The Spamproblem is
 
Who's online
We have 43 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us