Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

BLOG
Patrons of Bank of America Hit by Phishing Campaign PDF Print E-mail
Written by Administrator   
Friday, 30 January 2015 08:00

Wwlp.com reported on 21st January, 2015 stating that customers of Bank of America (North Carolina, US) are being targeted once again by cyber-crooks with a phishing email campaign.

A very genuine-looking phony email is being delivered to many email accounts which is a bogus net-banking alert claiming to be from the Bank. It has the absolutely right logos, colors and says that your account has not been available temporarily due to updation of the system.

It is a classic "phishing scheme" because it contains a link which looks genuine and it even starts with "https" making it appear like a secure website but actually it is not.

Clicking on the this fake link, it will lead to a unprotected and vulnerable website leading to a set of questions demanding for your debit or credit card information along with protection questions under the pretext of upgrading your account information.

Bank of America clearly announces on its official website (https://www.bankofamerica.com) that it will never send emails asking for your personal information like ATM, PIN or Social Security Number.

Security experts have issued some simple tips in trying to minimize attacks of the above type. They are: firstly, we (referring to the Bank in this case) will never claim that your account has been closed. Secondly, never verify your personal information through email.

Moreover, offers sounding too good to be true. We (Bank out here) will never ask you to fill up a customer service survey in lieu of money or getting you to fill a questionnaire as has been done in the above case and then ask you to submit your account number to enable you to receive the money.

The Bank advises on their website that if you receive any suspicious emails using the name of Bank of America, forward the same to it immediately at This e-mail address is being protected from spambots. You need JavaScript enabled to view it .

Just like Bank of America, a Co-operative Bank based at Wellington (New Zealand) was also attacked by a phishing scam during mid December 2014. It was reported that the phishing email asked customers to "kindly complete the verification process to avoid suspension of their account."

Read more... - Patrons of Bank of A...
 
Spammers Manage in Evading Anti-Spam Software, Finds Cisco PDF Print E-mail
Written by Administrator   
Friday, 30 January 2015 08:00

Cisco the networking company has just published its Yearly Security Report for 2015 according to which, spammers are well bypassing spam filters with diversified efforts across many Internet Protocol addresses, thus reported cbronline.com dated January 20, 2015.

The alleged term "snowshoe spam" reflects several traits of conventional spam mails as also frequently pursues the identical objective of planting malware onto victims' computers by distributing e-mail attachments.

According to Security Company Cisco, snowshoe spam can be lessened but for that security experts can't just depend on solutions which are great reputation-wise, as identical e-mails within an outbreak may flow from any number of places when the spam outbreak is derived from a botnet. Cbronline.com published this.

Organizations are urged to search for other indications of junk e-mail for example absence of forward DNS (domain name system) matching with the reverse DNS that normally suggests the unlawful nature of the mail server.

Cisco observes that plentiful IP addresses don't also have any information about dispatching e-mails making the security investigators conclude that somebody compromises the computers for building a botnet that will then be used for sending spam.

Moreover, the report discovers that one more emerging threat is fresh web attack toolkits. According to Cisco, hackers today keep discovering fresh toolkits following destabilization of conventional attack toolkits by security researchers.

Security Outreach Officer Craig Williams with Cisco states that Java exploitations have remarkably dropped thus representing a fine instance wherein safe development practices are going about. However, according to him, hackers are currently turning own interest towards Silverlight which's certain movie playback repository from Microsoft that numerous websites globally use. Rcrwireless.com published this, January 20 2015.

Vulnerabilities in JavaScript and Flash are one more important discovery that the report discusses. Cisco states that both since long lack security; however, joining both parts' weakest components could give into fresh malware. Flash malware may currently mix with JavaScript for concealing malevolent operations by both using the same exploit across 2 separate files i.e. JavaScript and Flash. The kind of mixed assault usually is pretty difficult for recognizing as well as regarded more effective when attackers adopt it.

Read more... - Spammers Manage in E...
 
BBB and Police Warns About Fake Emails Targeting Parents PDF Print E-mail
Written by Administrator   
Thursday, 29 January 2015 08:00

Wfmynews2.com reported on 20th January, 2015 stating that Better Business Bureau (BBB) and Greensboro Police (North Carolina, US) are sending a strong message to Internet users asking them to look for a new email scheme targeting parents.

A dangerous and fake email is advising readers that a child predator is in their locality and trying to collect personal and financial information illegally.

The website and email looks genuine and says that this based on your "local area zipcode" but authorities are advising people to not to open the web link attached in the email because it will install malware on the computer of the recipient.

The email itself looks like a "community safety" and so it is a warning to parents of a child predator in the nearby locality. However, Better Business Bureau says that it is just another way of trick to collect the identity and money from the people.

It said that it pulls the heart strings of parents and they will react to according to attackers.

The email reaches on your computer with "Alert: There is a Child Predator Living Near You" as the subject line.

However, when you click the link, you are redirected to a legitimate website known as "Kids Live Safe" which is the part of the plan.

While "Kids Live Safe" is actually a genuine site but the way the user takes to get there is not safe. It is dangerous and offensive but just like the threat of child abuse, it is not wise to assume that everyone on the Internet is safe and well meant.

Generally, it is not safe to click links which come as attachment with unsolicited emails. It is always better and safe to search for the actual organization with your browser to get more information.

Cross check the "From" field because scammers can conceal email addresses making the email appearing to come from a genuine source but they do not use it always. Check for email addresses which do not match the brand targeted in the email.

Look for strange phasing, typo and wrong grammar. Awkward wording and incorrect grammar are indications of a scam message, as in the above case, "local area zipcode".

Read more... - BBB and Police Warns...
 
Cyber-Attacks Growing with Casual User Behavior and Targeted Malware Campaigns PDF Print E-mail
Written by Administrator   
Thursday, 29 January 2015 08:00

Cisco in its new Annual Security report states that end-users' careless attitude together with malware attacks on specific targets are posing risk of security breaches to many industry segments with the greatest danger being for chemical-and-pharmaceutical sector.

End-users who remain chief targets likely even unwittingly assist cyber-assaults. The threat intelligence investigation team of Cisco reveals that all through 2014, attackers turned their attention away from operating systems (OSs) and servers since greater number of users accessed hijacked websites for downloading content thus resulting in Silverlight attacks to rise 280% while malvertising exploits and spam increased 250%.

In targeted attacks on end-users, the medium for disseminating undesirable applications or malware are browser add-ons, a strategy proving effective as numerous end-users essentially trust add-ons alternatively just regard them harmless.

There's greater sophistication observed among adversaries within their style of executing assaults as well as in eluding identification, the report states.

The attackers alter the tools and techniques employed in just no time, getting clean of tracks on a network prior to getting them to halt else swiftly select another mode for gaining admission.

According to Principal Engineer Jason Brvenik with Security Business Team of Cisco, attackers have gotten increasingly efficient in exploiting security gaps. Channelweb.co.uk published this, January 20, 2015.

Brvenik adds his organization noticed 56% of the entire OpenSSL editions continuing to be susceptible to Heartbleed while prominent assaults just utilize 1% of extremely important security flaws at any point-of-time.

John Stewart CSO at Cisco says that deploying security patches is a really difficult task within a complicated Information Technology arrangement since then the IT system requires being made non-operational. Csoonline.com published this, January 20, 2015.

Moreover, the necessary patches mayn't yet be obtainable alternatively no patch has any longer been applied to the software.

Stewart states that he's aware of companies which continue to use Windows NT without patching.

Conversely, if a company has complicated environment alongside numerous suppliers, patching maybe greater in number than what it can cope with.

Cisco for its research interviewed security executives from 1,700 businesses within United Kingdom and 8 more nations among which Germany, USA, China and India are included.

Read more... - Cyber-Attacks Growin...
 
Infamous Hacking Group ‘Lizard Squad’ Hacked by Third Party Hackers PDF Print E-mail
Written by Administrator   
Wednesday, 28 January 2015 08:00

Mirror.co.uk reported on 19th January, 2015 quoting a claim by Brian Krebs, a well-known Security Researcher, as "The hacking group namely 'Lizard Squad' guilty for bringing down the networks of Sony's PlayStation Network and Microsoft's Xbox Live on Xmas (2014) has been hacked by an unknown third party."

The Lizard Squad proposes a service called LizardStresser which allows anyone to hire a botnet to perform distributed denial of service (DDoS) attacks.

The malware has infected a botnet which is a network of systems or computers known as routers in this case and hackers controlled remotely attacking a particular website with traffic till the time the website goes down.

Lizard Squad rents out access to the tainted computers as a service enabling others to perform their attacks. The Squad even depicted Xbox and Sony hacks as a promotional tool to create curiosity in their service.

Unfortunately, things have not gone all that well for LizardSquad ever since the launch of LizardStresser as it has been struck by a number of unlucky incidents.

It seems the database consisting all emails, usernames and financial information of people who opted for this service have been hacked by an unknown third party and released to the general public.

Vpncreative.net published news on 19th January, 2015 stating that KrebsOnSecurity obtained a replica of database of customers of LizardStresser which highlights that it attracted over 14,241 registered users but only few hundred seem to have financed accounts at the service. Interestingly, all registered usernames and passwords were shelved in plain text and the database shows that patrons of the service deposited over USD $ 11,000 worth of bitcoins to pay for assaults on thousands of online addresses and Web sites (Including this one).

And as if that were not bad enough, one of the members of Lizard Squad was apparently arrested in the UK. Krebs first identified Vinnie Omari against whom a warrant was released for his arrest and he surrendered to officials in the country.

Moreover, Police in Finland quizzed a 17-year old namely Julius "Ryan/Zeekill" Kivimaki, after he and Omari gave an interview to Sky News about the assaults.

Read more... - Infamous Hacking Gro...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1232
Polls
The Spamproblem is
 
Who's online
We have 21 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us