Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

BLOG
Malvertising Scam Disturbs more than 113,000 US Users, Says Trend Micro PDF Print E-mail
Written by Administrator   
Thursday, 23 October 2014 05:00


Trend Micro lately said that it detected malicious advertisements exhibited on YouTube, while those also diverted over 113,000 Internauts within USA onto dangerous websites within merely one month.

Usually, Internet advertising firms remain on the lookout for such advertisements for blocking them as the ads move about across their networks; still some of the harmful ones occasionally get through. However, hackers reap immense benefit from such ads that could yield them many victims once displayed on a site that receives large traffic.

According to Fraud Researcher Joseph Chen at Trend Micro, the latest malvert flow was a disturbing occurrence. For, besides getting displayed on YouTube, the ads appeared on videos that received over 11m views. Indeed, one popular record label uploaded one specific video, an audio one that numerous people viewed, reveals Chen. Computerworld.in published this, October 15, 2014.

The researcher blogged that Web surfers visiting the advertisements got returned via 2 servers situated within Holland.

He elaborated that the attackers attempted at making their campaign appear genuine so they picked one Polish government website whose DNS information they modified. They didn't hijack that site rather added sub-domains to alter its DNS information. The sub-domains would take onto the attackers' servers, Chen said. Help-Net-Security published this, October 14, 2014.

Chen continued that the victims eventually got diverted onto one US-situated server that supported a known exploit kit, Sweet Orange.

Furthermore, the current attack's final payloads represent the KOVTER group-of-malware, the new variants identified as TROJ_KOVTER.SM. KOVTER has long been employed for different ransomware assaults. However, it's short of the encryption functionality seen in the CryptoLocker type of advanced assaults. The online sites, which TROJ_KOVTER.SM abuses for exhibiting the false alerts, have been withdrawn.

Meanwhile, Microsoft sometime back found the aforementioned flaw within its Internet Explorer browser and so issued one patch during May 2013. If anybody has deployed that updated IE/Adobe/Java, he'll be protected from the assault. In the case of previous versions, users will remain vulnerable since the online crooks continue to use them.

Trend Micro has by now apprised Google about the malvertising campaign while expects that Google will deal with the perpetrators fast.

Read more... - Malvertising Scam Di...
 
Penny Stock Spam Mail Campaign Targets Little Familiar Mineral Firm; BitDefender PDF Print E-mail
Written by Administrator   
Thursday, 23 October 2014 05:00


BitDefender is cautioning Internauts about one fresh penny stock bulk e-mail run which hitherto witnessed millions of spam mails landing inside inboxes worldwide so a hardly-familiar mineral firm has its stock value artificially raised.

The security company pinged over 3m distinct sample e-mails thus prompting it to describe the spam campaign as the biggest as well as most successful assault surrounding company shares during 2014. Enticing phrases have been used to attract the e-mail readers as the spammers made the messages appear legitimate through web-links for Yahoo Finance, Bloomberg, Reuters, the NASDAQ and MarketWatch.

Chief Security Strategist Catalin Cosoi with BitDefender explains how fraudsters make money out of their campaign by enticing investors with information of certain penny stock that will quickly rise in value. Called the pump-and-dump fraud, there's a general familiarity regarding the trick played, especially since the 2013 feature film 'The Wolf of Wall Street' depicted the trick used in a stock scam. When innumerable victims purchase the shares, the scammers dump or extensively sell their excess valued stocks into the same market, attaining huge monetary benefits, Cosoi adds. Help-Net-Security published this, October 14, 2014.

The spam mails show headers - "Christmas is here early my friend" or "Read up on this immediately" along with message body both crafted towards convincing readers they are forgoing benefits by not buying the shares.

Spam promoting over-valued penny stocks normally revolves around only one firm per campaign, with one fresh stock scam emerging every 2-3 months. Till now, the firms targeted in 2014 are Inspiration Mining Corporation, Rainbow International Corp., and Rich Pharmaceuticals Inc., among others.

Compromised PCs have been used to dispatch junk e-mails to distant South Korea, India and Australia. Numerous IP addresses hosted in UK too were recently spotted dispatching the e-mails.

According to Cosoi, the UK Internet Protocols in all probability are of infected PCs added to the stock spamming network-of-bots. These PCs are possibly disseminating the scam devoid of end-users' awareness, he contends. Infosecurity-magazine.com published this, October 14, 2014.

BitDefender has further talked with US Securities and Exchange Commission that stated that it was handling numerous complaints singleton stock-buyers had lodged.

Read more... - Penny Stock Spam Mai...
 
McAfee - Alia Bhatt is the Riskiest Celebrity in Indian Cyberspace PDF Print E-mail
Written by Administrator   
Wednesday, 22 October 2014 07:00

Ibtimes.co.in reported on 13th October, 2014 stating that security firm McAfee has revealed in a recent survey the names of most-searched Indian celebrities in Indian cyberspace with Bollywood actress Alia Bhatt topping its list.

As per the eighth edition of McAfee's most sensational survey, cyber criminals are taking advantage of the public's fascination for celebrities and entice them to websites maligned with malware enabling them to embezzle passwords and personal details.

Alia lead the list with 81 infected search results followed by Aamir Khan (78 malicious sites), Priyanka Chopra (69), Shahrukh and Salman Khan (64 each), Katrina Kaif (63), Shradha Kapoor (62), Ranveer Singh (61), Deepika Padukone (60), Hrithik Roshan (59) and Sonakshi Sinha with 58 malware ridden websites to her name.

The Times of India published news on 13th October, 2014 quoting the details and confirmation of the survey by Venkat Krishnapur, Vice-President of Engineering-Consumer, Business Group, McAfee India Center as "Fans treat Celebrities like demi-gods and want to know everything about their favorite stars by downloading their latest pictures, wall papers and music videos. So it's not only information but also videos and pictures which lure fans to search for their favorite star on the Internet. We have found from the survey that cyber criminals look for 2 things which are most popular and loved celebrity and the most trending celebrity and Alia Bhatt has been trending recently because of her new movies, selfies, Internet memes, spoof videos, etc."

He added that cyber criminals are constantly searching for ways to take advantage of fans interest related to TV shows, movies and latest trends of celebrities.

Surprisingly, Kareena Kapoor, Akshay Kumar, Saif Ali Khan, Amitabh Bachchan, Farhan Akhtar and Sunny Leone who stood at 4th, 5th, 6th, 7th, 8th and 9th positions respectively last year have all dropped out of this year's list.

McAfee advised that users must be aware about clicking links of third party and should ensure the usage of web protection which informs users about any fake sites or links before they visit or click them.

Moreover, users should avoid downloading videos from suspected websites and "free downloads" as it is the highest virus-prone search term.

Read more... - McAfee - Alia Bhatt ...
 
Retefe Trojan Now Attacking Financial Institutions in Japan, Says CSIS PDF Print E-mail
Written by Administrator   
Wednesday, 22 October 2014 07:00

According to CSIS the security company based in Denmark, the Retefe malware's configuration file has been found containing one name-list of a number of banks and other financial institutions to be targeted, with the malware currently hitting banks inside Japan as well.

The malware, which is in fact a Trojan, gets disseminated via junk e-mails as also arrives in disguise of a file attachment from some credible organization. However, if the attachment is viewed, the Trojan changes the DNS details along with Certificate Memory pertaining to any Windows computer.

Subsequently, the Retefe downloads fresh certificates and ensures that all traffic protocols get altered for diverting the e-traffic onto the remote attackers' computers. However, the victim's PC considers its SSL connection as secure despite there not being any defense against such assaults.

The entire process eliminates any doubt of sinister operation being carried out on the PC as no threat gets identified, while the victim senses the digital certificate as maintaining safe communication with the bank, whereas actually all of the traffic gets transmitted via sinister servers.

But, security researchers intercepted the Trojan in time to be examined thereafter. They discovered a modified form of the list-name containing the would-be attacked entities, while there were thirty-or-more web-pages included associated with many banks operating in Japan.

Retefe isn't unknown. It drew the notice of security experts as well as the media long back when during Operation Emmental (the name Trend Micro gave), the Trojan played the vital role. Incidentally, Emmental is name of a Swiss cheese.

During Emmental's activity, the cyber-criminals hacked into PCs belonging to bank clients within Austria, Sweden and Switzerland along with many other European nations.

As with online bank transactions, the two-factor authentication normally works; the attackers instructed the victims for taking down one bogus banking application they used for tapping the authentication codes users received from their banks.

Now, for remaining safe from the Trojan's infection, CSS suggests end-users use the most recent anti-virus for scanning their system as also deploy an auto-updater, a kind of software that keeps hunting fresh updates and loads any automatically onto the system.

Read more... - Retefe Trojan Now At...
 
ATO asks Taxpayers to be Wary of Tax-themed Scam Emails PDF Print E-mail
Written by Administrator   
Tuesday, 21 October 2014 07:00

Online news website Magnet reported on 14th October, 2014 stating that The Australian Taxation Office (ATO), official taxing agency in Australia, is warning the community to be careful of fraudsters as they are targeting people lodging their income tax returns before the deadline of 31st October (2014).

The Magnet itself was targeted by getting one such scam email on Monday morning, 14th October 2014, which read, as "You are eligible to receive a tax refund of $247.09 according to the last annual calculations of your fiscal activity."

The email also produced a tax file number and asked the recipient to click a link to download the form for refund of tax.

The email was sent from an email address, which did not contain ato.gov.au at the end and did not address to any individual but to a generic email address, which has not been use for many years.

Magnet recognized these signs and forwarded the email to ATO, which confirmed it as a scam email.

Magnet published a report on 14th October, 2014 quoting Todd Heather, Chief Technology Officer of ATO, as saying "Scammers are trying to get taxpayers quickly lodge their return by the deadline. People should be careful about tax scams and report them to us directly."

Fchornet.com published a report during middle of September 2014 quoting a warning of Detective Superintendent Brian Hay as that one should never access personal information on Internet cafes and use only updated operating system to avoid the chances of being victimized by such scam emails.

He added: "You must get latest anti-virus patched so that your system gets scanned regularly on daily basis. And you need to be more disciplined about what information you provide on the Internet so that you don't post too much personal information or photographs on a device which has activated the geo-locator settings as it informs the crooks about your whereabout."

Meanwhile, it is not only the Australian taxing agency which is alerting people about tax-themed emails as Revenue Commissioners, the tax-agency of Ireland, also released similar warnings because scam emails there also promised refund of tax to innocent taxpayers.

Read more... - ATO asks Taxpayers t...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1197
Polls
The Spamproblem is
 
Who's online
We have 26 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us