Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

A Man in New Zealand Losses $200,000 in Fake Email Rip-off PDF Print E-mail
Written by Administrator   
Thursday, 05 March 2015 08:00 reported on 26th February, 2015 stating that a West Coast (New Zealand) man who has lost $200,000 in an email scam had been comprehensively trained through Internet for a long period before he was cheated of his money. published news on 26th February, 2015 quoting Dan Keno, Detective Senior Sergeant of Greymouth (New Zealand) CIB (Criminal Investigation Branch) as saying "the man had reported the scam only now although it had occurred late last year."

The man who is keeping his location secret, disclosed details to the scammers after initial contact through a series of reciprocal emails.

This had made possible for scammers to contact him in manners which looked genuine including a phone number which appeared to be from Auckland.

The officer stressed that people needed to be very careful about any email or message received from unknown person or source. published news on 25th February, 2015 quoting Mr. Keno as saying "Anyone giving an offer involving some financial gain for you may be a scammer. Unfortunately, they target trust and the greed of the people. No one can win million dollars in a lottery in which one did not participate and the Nigerian Bishop who wants to deposit his fortune in your account actually does not exist also.

Scammers used post, email, text messages and social networking along with any other suspicious communication should be reported to the Department of internal Affairs.

He said that many scams looked genuine.

He said that it was very unlikely that a victim of this scam would get their money back.

Experts analyzed the scam email and commented that it is important to be aware of the different types of scams going around especially if you use email or mobile phone because scammers will do anything to rip you off.

You should never open emails which come from unknown or suspicious source and if an email asks for personal information, then never give in. If an email contains a link, hover your mouse on it to find if it relates to the email. Experts stressed recommending some simple tips like always try to verify the authenticity of any email by independent means (like in the above case).

Read more... - A Man in New Zealand...
Europol Terminates Notorious Ramnit Botnet PDF Print E-mail
Written by Administrator   
Thursday, 05 March 2015 08:00

The Ramnit network-of-bots, which cyber-thugs popularly leveraged for committing financial fraud is finally in a dismantled state via a combined initiative that EC3 (European Cybercrime Center) of Europol spearheaded, published dated February 25, 2015.

Lately EC3, also recognized as police agency of Europe, stated that investigators from different European countries, together with Symantec, AnubisNetworks as well as Microsoft performed the dismantling job that cracked the botnet's C&C structure followed with diverting all traffic originating out of 300 domains, which Ramnit utilized, onto domains that officials controlled.

The Ramnit, according to EC3, infected over 3.2m Windows PCs.

The modes through which the malware was disseminated included drive-by downloads, phishing scams and spam campaigns. These attacks lured victims towards unknowingly loading the program. That subsequently helped the attackers gain admission into the contaminated PCs from where they stole chiefly banking credentials. However, they even stole FTP log-ins, social-networking A/C passwords etc. Immediately after gaining backdoor access to a PC, the malware tried identifying the AV programs active on that compromised system and disabling the software's detection capabilities.

Disturbingly, Ramnit has contaminated PCs globally and the nations worst impacted are Bangladesh, USA and India. It targeted more countries such as Turkey, Egypt, UK, Pakistan and Philippines, amidst others.

In a remark, Wil van Gemert Deputy Director Operations of Europol said that the success of the dismantling operation indicated how important global law enforcement was when carrying out their tasks along with private players for combating the worldwide danger that Internet crime posed. According to him, Europol would keep its efforts on for terminating botnets as well as destabilizing their central infrastructures that crooks employed for executing various cyber-crimes. The agency, in combination with member states of European Union and alliances worldwide, aimed at safeguarding people globally from the above kind of criminal activities, he concluded. published this, February 25, 2015.

Currently after the shutdown operation, investigators would examine the confiscated C&C servers while locate their operators too. And if no detention of the criminals happens, the Ramnit owners would keep doing the crimes and possibly even establish new infrastructures for capturing more banking credentials, analyzed the investigators.

Read more... - Europol Terminates N...
Brazilian Internauts have Cyber-Crooks Compromise their Internet Connections PDF Print E-mail
Written by Administrator   
Wednesday, 04 March 2015 08:00

According to Proofpoint, cyber-criminals by altering the DNS (domain name system) configurations within Internauts' routers in Brazil have been getting hold over such users' online connections recently.

The operations, which are described as pharming assaults, entice victims towards accessing fraudulent websites that normally resemble banking sites within attempts to grab sensitive information such as bank log-in credentials.

Pharming assaults have proved as extremely successful since often they're hard to recognize. In these, the assaulters by changing domain name system configurations in routers make sure that end-users land on a fake website soon as they enter a genuine website's domain name inside the address bar of their browsers. Normally, network-based assaults are the means for compromising the DNS; however, during one recent scam, phishing e-mails too proved successful.

It was during mid-December 2014 when Proofpoint began closely watching the campaign. The company researchers note that a spam mail was involved that seemingly arrived from a major telecommunication company of Brazil. They saw one small-scale spam outbreak running for 4 weeks when close to 100 spam messages were distributed primarily to organizations and individuals in Brazil.

A URL inside those spam mails diverted victims, who followed it, onto web-pages which leveraged cross-site request forgery (CRF) for attacking routers, illegitimately cracking log-in page of the admin via the dispatch of HTTP requests to it till finally the victim entered the right identifiable details.

The attackers used one backup service too that they created for the DNS (domain name service) belonging to them for utilization within the assault whose function began when the main malevolent DNS got disturbed for eschewing any suspicion by the victim.

When receiver of the phishing e-mail followed the web-link while there would occur successful exploitation of the vulnerability, all PCs connected to the compromised router would apparently experience them requesting one malevolent DNS server for seeking hostname of no particular one, online, the security company explains.

With carrying out the attack effectively, it was now possible for the hacker towards intercepting the online conversations, enabling them to gain hold over confidential data, particularly from websites, e-mail communications, along with passwords and logins.

Read more... - Brazilian Internauts...
Ransomware is Increasingly Prevalent in South Africa PDF Print E-mail
Written by Administrator   
Wednesday, 04 March 2015 08:00 reported on 13th February, 2015 quoting Securicom, Special IT security vendor, as saying "Ransomware which is a very nasty type of malware which stops users from using their PCs is raising its head in South Africa."

Wikipedia says that 'Ransomware' usually transmits as a Trojan like a conventional computer worm which enters a system through as a downloaded file or vulnerability in a network service. The program will run a payload like the one which will begin to encrypt personal files on the hard drive and only the author of the malware knows about the decryption key. The malware encrypts some files on the hard drive of the system or lock the system wholly demanding a ransom amount to remove it. published news on 13th February, 2015 quoting Richard Broek, National Sales Manager of the company, as saying that infections of ransomware are going to become more widespread."

He warns that ransomware is precisely a real problem and further shed light on the malware.

He added that cybercriminals actually hold data of a company as a hostage and ransomware hits millions all over the world and experts are forecasting that it will target smaller businesses later on and companies in South Africa are not protected.

According to the company's stats only one firm was able to recover their data out of the three that reported of ransomware contamination in 2014. There is another company whose CFO's notebook got tainted and who actually paid ransom to retrieve sensitive data which did not have back up. Luckily, in this case the information was restored.

It is never guaranteed that the information will be returned even after paying the ransom and according to experts, paying ransom is not the best remedy. And as more and more firms continue to pay ransoms for the recovery of data, it becomes more profitable for criminals to continue.

Broeke advises that companies must re-focus on IT refuge to prevent these hacking.

South African companies, especially smaller ones, tend to fall short in IT security. The slackening economy causes reduction in budget resulting cut in expenses, fewer resources and reduced focus on security.

Read more... - Ransomware is Increa...
Kaspersky Exposes the Framework of a Massive Cyber-Espionage Group PDF Print E-mail
Written by Administrator   
Tuesday, 03 March 2015 12:00

Security researchers of Kaspersky Lab have discovered a group of cyber-espionage which has been functioning for a minimum fifteen years and has also toiled with and supported the goons behind Flame, Stuxnet and other extremely sophisticated campaigns.

The attackers, recognized as Equation Group, employed two of the zero days confined in Stuxnet before that worm used them and have employed several other methods to infect including prohibiting physical media like Compact Discs and inserting their tailored malware implants into discs.

The group has employed some techniques which are closely connected with tactics used by the NSA particularly the banning operations and the employment of LNK flaw exploit by Stuxnet.

The nefarious gang has enormous, flexible and threatening resources at its disposal. The attackers employ two hidden modules along with using many zero days in its operations which facilitate them to reprogram the hard drives on tainted machines. Due to this, attackers can remain persistent on hijacked machines indefinitely and construct a hidden storage partition on the hard drive which is employed for stolen data storage. published news on 16th February, 2015 according to which Costin Raiu, Director of Global Research and Analysis Team of Kaspersky, said: "It means we are actually blind and cannot detect hard drives which have been infected by this malware."

The malware could also create an unseen obstinate area hidden inside the hard drive to save exfiltrated information which can be retrieved by the attackers later on. This means that the attackers can capture the encryption password and save it into this hidden area. It can revive itself forever."

As per the record, the Russian security vendor (Kaspersky) claimed that they have first discovered the evidence of the Equation Group while investigating Regin. One machine of a victim in the Middle East was apparently found to be infected with one of the group's malware platforms known as EQUATIONDRUG. published a report on 18th February, 2015 quoting Vanee' Vines, Spokeswoman of NSA, as saying "The agency was aware of the research of Kaspersky but we are not going to comment publicly on any charges that the report raises or discusses any details."

Read more... - Kaspersky Exposes th...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1244
The Spamproblem is
Who's online
We have 42 guests and 1 member online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us