Saturday, March 31, 2012

Get a Free $1,000 Walmart Gift Card! – Facebook Scam

Scam Signature Message:Get a Free $1000 Walmart Gift Card!getcashorgift.comGet a Free $1,000 Walmart Gift Card!Scam Type:Survey ScamTrending: November2011Why it s a Scam:Clicking the wall write-up link takes youto the following page:As usual, here you are asked to Share the message along with your friends and enter a comment on the page. After entering the comment, the following  See More..

multiple updates for Windows, Java, Adobe, Thunderbird and Firefox

This week has been a quite busy one for Microsoft, Sun, Adobe and Mozilla Foundation. We have seen the Microsoft Security Bulletin MS11-037 announcing the patch of some vulnerabilities which may well allow an attacker to execute arbitrary code, cause a denial-of-service condition, or operate with elevated privileges. Adobe released a Security Bulletin for Adobe Shockwave  See More..

FBI’s Operation Ghost Click takes out operators of DNS Changer malware network

The FBI is cock-a-hoop today, Getting just announced the bust of six Estonians for malware-related cybercrimes. The case goes back to 2007, with the study itself apparently Getting taken two years. The FBI claims that the gang infected 4,000,000 computers in 100 different countries with 500,000 infections inside the USA alone. The crooks are  See More..

Firefox 8 released!

Mozilla announced nowadays the official release of Firefox 8, a new version of the Popular open source Net browser. The modest update introduces a couple of new features and brings a number of minor improvements to the browser s underlying HTML renderer. The built-in search box in Firefox s navigation toolbar has been extended to support Twitter searches.  See More..

Steganography or encryption in bankers?

??? although searching over some potentially malicious links from Brazil, I came across an interesting group of files. They were of varying sizes but had similar structures. ? initial I notion this was some kind of steganography. The files has a jpeg extension, but were in reality bmp files in structure. It was evident that  See More..

DNSChanger Fraud Ring Busted

Here s a cash Creating idea: find some advertisers and tell them you'll be able to put their ads on billboards at half the going rate. You don t own any billboards? No problem, just go paste the ads over the ones on someone else s billboards. This idea has not really caught on within the real worldit s impractical to  See More..

FBI: Operation Ghost Click

A US court has indicted seven men (6 Estonians and 1 Russian) as part of the US Federal Bureau of analysis s Operation Ghost Click. Estonian authorities have made 6 arrests, the Russian defendant is still at large. Long time blog readers need to don't forget one of the defendants, Vladimir T?a?t?in (aka SCR ), from Case EstDomains, circa  See More..

Remove Hard-to-Kill Malware

Jane13434 asked the Antivirus Security Software forum about removing a malicious method that has defeated AVG, SUPERAntiSpyware, and Malwarebytes Anti-Malware. Are you currently certain The problem is malware? men and women frequently jump to that conclusion when there s something wrong with their PC, and in my experience that conclusion is significantly more frequently wrong than right. There s a  See significantly more..

ideal Pit where You Don’t want to Stop

Sporting events are almethods Well-liked among the spammers. Formula 1, a game of speed, thrill, and action, is no exception. inside the past we have seen spam messages ranging from cheap and/or fake game tickets to phishing around almost all main sporting events. We are observing spam targeting the upcoming F1 Grand Prix that is  See More..

Skyrim Scammery

Everybody loves dragons, and everybody quite loves hunting these endangered creatures by indicates of their natural habitat ahead of plunging about five hundred spears into their evil, cattle stealing hearts. And so it came to pass that Skyrim would be released this weekend. It at the same time came to pass that individuals would make fake websites and try to convince  See More..

MSRT Nov’ 11: Cridex – the hex of Skidlo

Earlier, we discussed Win32/Carberp, a malware family included within the November release of the Malicious Software Removal Tool. In this post, we discuss Another included malware, Win32/Cridex. Win32/Cridex is a relatively new family; we located its quite first variant within the wild in August 2011. This trojan is primarily downloaded and installed by other malware, detected  See More..

Microsoft release four security updates on Patch Tuesday

What is Patch Tuesday? Microsoft gives core platform patches and updates monthly, often on the second Tuesday of every month. This has become known as Patch Tuesday. What has been fixed this time round? The patch includes a fix for a serious hole allowing remote code execution in Windows. Importantly, this patch is only available  See More..

Use iPads to make Fascinating Effects on Halloween

Mark Rober is a Mechanical Engineer at NASA’s Jet Propulsion Laboratory and He had been working on Mars Rover to conduct research on Mars for living organisms. But when He isn't at NASA’s laboratory and not Performing anyfactor important, He is discovering approaches to create his Halloween costume a lot more fascinating. He attached two iPads  See a lot more..

11/11/11 – time to make a Nerd New Year’s resolution

today is 11 November, greater known as Armistice Day or Remembrance Day. At 11am French time, the gruelling War to finish All Wars officially finished at least on the Western Front in 1918. The irony of giving that name to what is now known as World War One is heart-wrenchingly depicted on the  See More..

Steam Gets Hacked: Here’s how to keep Safe

ought to you re a gamer who plays titles that use the Steam platform from Valve, you'll require to maintain a close eye on your own data. On Sunday November 6, Steam servers got hacked, and at the same time the hackers gained access to the user database. Initially the attack appeared to be against the Steam forums, but Valve  See More..

Steam goes public on data brereally – but will it delay the launch of Skyrim?

Steam, the on the internet empire of computer game behemoth Valve Corporation, has issued details of the hack it suffered last weekend: Dear Steam Users and Steam Forum Users, Our Steam forums were defaced on the evening of Sunday, November 6. We began investigating and found thin the intrusion goes beyond the Steam forums. We learned that  See More..

4 Southwest Tix – Facebook Scam

Scam Signature Message:4 Southwest Tixwww.share2fly4.infoTo celebrate, we are giving away thousands of Vouchers- Scam Type:Bogus OfferTrending: November2011Why it s a Scam:Clicking the wall article link takes youto the following page:As usual, here you're asked to Share the message together with your friends and enter a comment on the page. After entering the comment, the following Marketing and advertising and marketing  See More..

on the web pharmacy spam disguised as AOL.com phishing

Equite time when I see a phishing where AOL is involved I turn into nostalgic. The reason for that's thin the initial phishing seen online was sent on an AOL newsgroup on January 2. 1996. Here is one email which looks quite phishy in the initial sight. All links except the inbox are going to  See More..

Apple release security fix

What has been fixed? Apple has published Java updates for Mac OS X 10.6 Snow Leopard and 10.7 Lion which bring the Mac version of Java in line with the current Oracle release. The updates improve compatibility and close many security holes discovered in previous versions. in accordance with Apple, several of the vulnerabilities could allow  See More..

PDF Malware is Back in Season

Avid readers of the GFI Labs blog can attest thin they re no strangers to this sort of attack: one receives an email purporting to have come from a legitimate company with an attached Adobe .PDF file claiming that it s either a receipt, a document, or a ticket. Claims of whin the attachment is supposed to  See More..

Analyzing malicious files for writing network signatures

Attackers continually modify malware as a way to evade antivirus software. Attackers will pack or encrypt malicious files utilizing distinct packers. Blocking efairly and eextremely malicious executable is a challenging task for antivirus vfinishors. Most malicious files, once installed, try to download extra malware or sfinish HTTP GET/post requests to malicious servers controlled by attackers. Malicious  See More..

Adobe Flash “SWF” Exploit still in the Wild.

A vulnerability reported in Adobe Flash in April 2011 (CVE-2011-0611) continues to be targeted. When extremely first reported, the vulnerability was widely exploited by embedding a .swf file into Microsoft Workplace documents/html pages. Adobe issued patch for this vulnerability soon after it was reported, but the vulnerability remains a Popular target. Source of hxxp://220.181.23.217/baike/mhxy.html : This  See More..

financialstatements.mrsdl.com, nookbizkitsad.com and 94.102.11.168

This is a fairly Well-known virus laden email: Subject: ACH Transfer was not accepted by our bank Dear Bank Account Operator, I regret to inform you that ACH Transfer created by you or on your behalf was not accepted by our bank. Transaction ID: 1709919126682218 Current status of transaction: on hold Please review transaction details  See More..

Lab Matters – Detecting Malware Attacks on Smartphones

In this edition of Lab Matters, Ryan Naraine interviews Kaspersky Lab CTO Nikolay Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks concerning the taxonomy of threats and explains Kaspersky Lab s vision for protecting data on smart phones. The discussion touches on privacy issues, data protection, anti-theft recovery, social engineering, URL filtering and parental  See More..

The Duqu Saga Continues: Enter Mr. B. Jason and TV’s Dexter

As we informed you earlier, we ve recently been conducting an analysis into several incidents in connection using a Duqu trojan infection. Thanktotally we ve been able to make a couple of headway in Getting to the bottom of Duqu and putting together many of the previously absent components with no which it has been tough to understand  See More..

Rihanna Scandal Scam Video

If you may well be a fan of Rihanna then you’ll be disappointed to understand that Rihanna scandal scam video is being utilised to infect computers. The video is being distributed on diverse websites and social networks including Facebook. The file that seems to be a video is actually linked to a suspicious file. When the video  See More..

Personal data of 65,000 FoxyBingo players sold for cash

Like playing on the web bingo? You may possibly well find which you re gambling with far more than money if thieves wind up together with your personal data. That s what happened to 65,000 players of on the web bingo at FoxyBingo.com, which is billed by its owners, Cashcade Ltd., as the U.K. s top bingo site. The U.K. Information Commissioner s Office (ICO) reported  See far more..

Adobe release security fix for Shockwave

What has been fixed? Adobe has announced that severe vulnerabilities have been located in Adobe Shockwave Player 11.6.1.629 and earlier versions. These vulnerabilities could allow an attacker to run malicious code on the affected system. Full details of the update may be discovered on the official Adobe patch page. Who is affected? As Adobe s Shockwave  See More..

Hide and seek with site injections

As we have seen several times before (e.g. Mal/Iframe-Gen, Mal/Iframe-W), compromised sites are often injected with large, heavily obfuscated blocks of JavaScript. The primary goal of such scripts is to make it tough for scanners to detect the payload (frequently an iframe or script load). However, the side effect of large, ugly, obfuscated scripts is  See More..

Facebook and FTC Close to Settlement: Opt In Policy to be Implemented

Facebook and the Federal Trade Commission (FTC) are said to be on the verge of reaching a settlement over the organization s privacy practices a settlement that would fly inside the face of how Facebook has implemented new features inside the past. The changes would absolutely go a long way in helping users obtainside the  See More..

Friday, March 30, 2012

Hot on the trail of Duqu with Microsoft’s MAPP

The Duqu malware has raised the specter of StuxWorld wide web II, with some in the security community claiming that this new Trojan is really a reverse-engineered copy of StuxWorld wide web the inrenowned malware that can have sold a lot more newspapers than it damaged nuclear centrifuges. Unlike StuxWorld wide web, Duqu is designed to steal data from the targeted organization, not  See a lot more..

Anonymous and LulzSec trawl Google Code search for security holes

Exotically named hacking tools such as Low Orbit Ion Cannon and #RefRef have garnered plenty of headlines over the last few months but a brand new report suggests thin the world s favourite search engine may possibly be an equally crucial weapon inside the arsenal of cyber-criminals and hacktivists. The report explains how a fundamental search on Google  See More..

LOST ALL RESPECT FOR SOULJA BOY AFTER WATCHING HIM BEAT UP HIS GIRL – Facebook Scam

Scam Signature Message:LOST ALL RESPECT FOR SOULJA BOY AFTERWATCHING HIM BEAT UP HIS GIRLsouljaboybeating.blogspot.comCANT feel HE BEAT HER UP IN PUBLIC LIKE THAT . WHYsort OF MAN IS HE!!Scam Type:Survey ScamTrending: November 2011Why it s a Scam:Clicking the wall write-up link takes youto the following page designed to look like Facebook:Clicking the play button loads a  See More..

Fake Social Netoperating Application Promotes Maldives

Co-Author: Avdhoot PatilWhen phishing through social media, fake applications are a key system employed by phishers to introduce new sorts of baits. In October, 2011, phishers launched a brand new fake application named Maldivian App . The phishing site was hosted on a free webhosting domain. It ought to be noted the legitimate site does not provide such  See More..

Apple’s iOS 5.0.1 is out – In the event you upgrade?

Apple s latest iOS update is out. The new version bumps iOS5 as much as 5.0.1, and is Apple s initial OTA update. OTA stands for over-the-air , and indicates that you can download and apply the update directly from your iDevice. You no longer have to download the whole firmware file to your computer including yet An additional  See More..

LANDesk Interchange 2011, Poison Ivy, and US Incidents

LANDesk Interchange 2011 is winding down in Las Vegas today. The event gathered partners and displayed newer technologies offered by the decade old systems management organization. It was interesting hearing from IT old-timers that have worked with the technology, describing the organization s impact on the business its spinoff from Intel, the original LANDesk AV  See More..

Judge Rules Teacher need to Lose Job over Facebook Post

Facebook is frequently an outlet for several people a place where their innermost thoughts can be shared with friends. The wisdom of utilizing it for such, however, is highly questionable. many people have lost their jobs or gotten suspended from school simply given that they had a case of TMI on their Facebook wall. In fact,  See More..

98 Percent Of people Cant Watch This Video For much more Than 15 Seconds – Facebook Scam

Scam Signature Message:98 Percent Of men and women Cant Watch This Video For MoreThan 15 Secondswww.icantwatchthihs.tkCLICK LINK TO WATCH VIDEO SEE HOW LONG YOU CANLAST !!Scam Type:Survey ScamTrending: November 2011Why it s a Scam:Clicking the wall post link takes youto the following page designed to look like Facebook:Clicking the play button loads a share box allowing you  See More..

Data Mining Engineer- Threat Detection

Data Mining Engineer- Threat Detection Posted: 12 November 2011 business name: McAfee Location: Alpharetta, GA United States Travel: occasionally Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:The Global Threat Intelligence team at McAfee Labs is looking for an addition to their team, located in Alpharetta, GA, for relooking and  See More..

Director, Net and Messaging analysis Operations

Posted: 12 November 2011 enterprise name: McAfee Location: Denver, Santa Clara, St.Paul, Beaverton United States Travel: usually Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description: The Director of Web Messaging study Operations is responsible for managing a globally distributed team of study Analysts and studyers that write signatures  See More..

You practice safe computing, so why do you nonetheless see malware?

extremely regularly, I get feedback from our customers that they ve found malware on their computer, and don t know how it got there. although you'll believe This is due to malware exploiting unpatched bugs within the Windows working system, it isn t: these customers are predominantly using OS X, and they usually have all the latest  See More..

Facebook nears settlement with FTC on privacy opt-in

Facebook is nearing a settlement with the FTC over charges that it misled users about how it uses their personal information, in accordance with a report published on Friday by the Wall Street Journal (WSJ). Those familiar with the talks told the WSJ that the settlement would call for Facebook to obtain users consent ahead of Making material  See More..

Firewalls Can’t maintain up With DDoS Attacks

businesses nonetheless rely heavily on firewalls to defend themselves against denial-of-service attacks despite the truth that this class of device is usually not up to the task, a brand new survey by F5 Networks has identified. The survey of 1000 medium and massive businesses in ten countries identified that up to 45 percent of respondents experience  See More..

Hidden Apple iOS 5 Autocorrect Keyboard Bar located by Researcher

in the month given that Apple s release of iOS 5, a handful of features and workarounds have been discovered hidden beneath the mobile working system s surface. a few days ago, One more feature was extra to that list an autocorrect keyboard bar. according to 9to5Mac, the Android-like feature allows users to pick from a series of  See More..

Apple’s OS X sandbox has a gaping hole – or not

Argentinian security business Core Labs (that is the core analysis group, if you'll pardon the pun, of US-based Core Security Technologies) has just published a critique of Apple s attitude to security. In an article entitled A Tale of Two Advisories, the Core Labs analysisers discuss vulnerabilities disclosed to Adobe and Apple, along with the response  See More..

straightforward Money: Program:Win32/Pameseg (part one)

right now numerous individuals think within the opportunity to achieve excellent wealth with no significantly effort, not leaving the house, not interrupting their favorite computer games, forums, social networking and so on. This type of opportunity is widely marketed by organizations providing paid digital content services. you may have seen on the web Marketing and advertising banners such as: Make a  See More..

Shopping spree at Morrisons? Nope, One more Facebook scam…

Thanks to a tip we received from a Naked Security reader, we saw an interesting Facebook scam on Friday. As we know, times are Getting tougher, especially with the holidays approaching. Food prices are high, morale is low, so who wouldn t require nice huge ?150 gift card from Morrisons? It seems simple enough. Share the  See More..

Facebook WON’T donate 45 cents per share for beaten boy’s surgery. It’s a hoax!

virtually 200,000 Facebook users have been duped into sharing and reposting a message about a 14 year old boy who was allegedly beaten badly by his stepfather after protecting his small sister from being raped. The message, which comes attached to an image of a young boy s injured torso, claims that Facebook will donate 45  See More..

Ambulance service disrupted by computer virus infection

The St John Ambulance service in New Zealand fell victim to a computer virus infection last week, in accordance with media reports, which disabled its automated response systems across the country. The service, which gives 90% of the emergency and non-emergency ambulance cover for the New Zealand population, was struck by a malware attack on Wednesday  See More..

Malware signed having a governmental signing key

Certificates and CAs continue to be a hot subject (think Stuxnet, Duqu, Comodogate, Diginotar etc). Equite now and then we run into malware that has been signed having a code signing certificate. This extremely is problematic, as an unsigned Windows application will develop a warning to the end user if he downloads it from the net  See More..

points you have to Know About Security Awareness Program

Employees operating in a enterprise need to realize environment of workspace. It is important for employees to realize the enterprise they are operating in, its motive and most importantly its clients. Employees play the most important role in enterprise’s success and they suffer equally when sensitive Information goes in wrongs hand. Security awareness programs trains employees  See More..

Hacked Sky News Twitter account claims James Murdoch arrested

The official Twitter account controlled by the enterprise desk of Sky News was apparently hacked last night to display a false message claiming that News Corporation s Chief Executive and Chairman James Murdoch had been arrested by police in London. BREAKING: James Murdoch arrested over phone-hacking claims. Questioned at Paddington Green police station at 10pm. The  See More..

Denard Robinson’s Twitter Gets Hacked: The significance of Security in Social Media

Privacy and security things in social media are obviously a massive concern to many of the those that use these kinds of sites. Most of the those that actually show their personal Information don t recognize the consequences they could face, and the others most likely don t care. It's far more important now than ever ahead of to  See far more..

Htaccess redirection to sweepstakesandcontestsInformation dot com

since last week we started to see a large increase within the number of sites compromised having a .htaccess redirection to http://sweepstakesandcontestsinfo.com/nl-in.php?nnn=555. This dosignificant has been utilised to distribute malware for a even though (generally by way of javascript injections), but only within the last few days that we started to see it being completed through .htaccess. This  See More..

SCAM ALERT: “you have (1) New Message alert!” from PayPal

Today, we ve received An additional phishing email purporting to be from PayPal with spoofed email address. Scam subject: you have got (1) New Message alert! Scam message: Dear PayPal Member, We are contacting your regarding your PayPal Profile Information It has come to your attention that your profile Information will not match the Information your bank has  See More..

Leveson phone hacking inquiry interrupted.. by a Trojan horse

The really first day of an inquiry into phone hacking by the British media was briefly interrupted today, by a Trojan horse. David Sherborne, a QC representing phone hacking victims, interrupted the Leveson Inquiry in the High Court in London to reveal that his computer was infected by a data-stealing Trojan horse. Sherborne, who represents celebrities  See More..

Anonymous threatens Mexican politicians and City of Toronto

Two new videos have surfaced purporting to be from the on the internet collective known as Anonymous. The initial video was posted on the New Alliance Party s website after it was hacked and defaced. The video was also posted to YouTube with the title Anonymous declara la guerra a la corrupcion del gobierno mexicano which translates to  See More..

Oops! Rick Perry searches are popular, plentiful and .potentially harmful?

all through the Republican Presidential Debate on November 9. 2011, Rick Perry s speech garnered lots of attention but almost certainly not the type he sought.Social Media has popularized this YouTube video, with the number of views skyrocketing to 1.7 million in just two days, thereby Producing it a brand new member of the Viral Video category as  See More..

NACHA / Wire Transfer malicious emails

I m not confident if these three incidents are all related or are just producing use of the same approach, but here goes. Date: Mon, 14 Nov 2011 17:53:54 +0100 Subject: Disallowed Direct Deposit payment Dear Sirs, Herewith we are notifying you, that your latest Direct Deposit transaction (No. 60795715105) was disallowed, given that of the fact of your business  See More..

Amazon Kindle Fire launches, a second look at Silk privacy

individuals who pre-ordered an Amazon Fire Android tablet started receiving their units today. you will find multiple reviews out there, so if that is what you might be looking for I will leave you to read them at Wired, ars technica or elsewhere. Now that Amazon has launched the Kindle Fire I wanted to rego to the privacy  See More..

Wednesday, March 28, 2012

Bogus Bank of America Google Plus page attacks their reputation

As the Occupy Wall Street movement continues, hackers have turned to attacking a couple of of the economic institutions protesters feel are responsible for their situation. the web page representing Bank of America on the Google Plus service offers the appearance that it was hacked. It doesn't appear this page was in fact controlled by Bank of  See More..

Connections Between DroidDreamLight and DroidKungFu

We were recently able to analyze the routines of the latest DroidKungFu variant, detected as ANDROIDOS_KUNGFU.CI. even though we were monitoring the traffic between ANDROIDOS_KUNGFU.CI and its remote server, we chanced upon a command to delete a certain package.inside the command above, the server instructs the malware to delete a package called com.practical.share. We have seen  See More..

considerably more free software repackaged for money

In previous posts, I ve shown how Common free software programs are repackaged andsold by scammers, while containingspyware, or are outright replaced by malware. The number of Internet sites offering such repackaged software has been on the rise inside the past weeks [LINK TO PREVIOUS POST]. the most Common repackaged software used to be Flash, antivirus  See More..

Websense 2011 predictions score A-, 2012 predictions coming soon.

About a year ago we predicted whin the biggest security risks would be in 2011 and as we re coming up towards the end of the year we wanted to see how accurate these predictions were. We have rated our 2011 predictions on a scale of A-F. Here we go!1. The StuxWeb sequels are comingeven though there  See More..

Divorcing couple ordered to hand over Facebook and dating site passwords

Do you, Facebook user, take your privacy, as stated with regards to Service, to have and to hold, from this day forward, for better, for worse, via scams and via flirtations with high school sweethearts, in viral malware and in health, to enjoy and to Shield your adulterous licentiousness, till death do you part? Forget  See More..

The Mystery of Duqu: Part Five

Driver The driver is the first component of Duqu to be loaded inside the system. As we discovered, the driver and other components of malware are installed using a dropper exploiting a 0-day vulnerability (CVE-2011-3402). The driver is registered inside the HKLM\System\CurrentControlSet\Services\ registry path. The exact name of the registry main varies in distinct versions  See More..

GUI Developer (m/f) for the Avira Management Center

GUI Developer (m/f) for the Avira Management Center Posted: 15 November 2011 enterprise name: Avira Location: Tettnang Gerseveral Travel: none Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:We are seeking to immediately fill the position of GUI Developer (m/f) for the Avira Management Center you'll be a member  See More..

Joomla 1.5.25/1.7.3 Released (Security Update)

If you may be creating use of Joomla, now is the time to update it. a new version was just released for the 1.5.x and 1.7.x branches fixing a high priority security issue that can allow remote users to change other users passwords (even on admin account). significantly more details on the Joomla website and here. Description: Weak random  See significantly more..

Security 101: Attack Vectors, Part 1

in the very first part of this series, we discussed the entry things that an intruder could use to attack our building, our metaphor for network security. in the next few posts, we shall concentrate on the next level: attack vectors. If vulnerabilities are the entry things, then attack vectors are the methods attackers can launch  See More..

Sophisticated spam mails after data leak in enterprise database

Tintencenter.com acknowledged the data leak and explained thin the attackers gained access by way of a formerly unknown vulnerability in the shop s system and collected email addresses too as the provided shipping and billing addresses.Reports in German consumer advice center forums suggest that a initial wave of very sophisticated spam using the customers data appeared in August already.  See More..

DevilRobber Gets An Updated Version

We discovered an updated version of Backdoor:OSX/DevilRobber, which we posted about earlier. The updated version uses the same program as its predecessor to disguise itself as a legitimate application, although this time it calls itself PixelMator. Depending on the malware s dump.txt file, this latest backdoor is located as Version 3 (v3). The main point of  See More..

Ach ‘payment canceled’ spam

Blast of new spam emails targeting computer users and attempt to infect them using a variant of the banking trojan by posing as ACH transfer failure notifications. The spam mail has one of the following subject lines: -ACH payment canceled -ACH payment rejected -ACH transaction canceled -ACH Transfer canceled -ACH transfer rejected -Rejected ACH payment  See More..

Apple iOS update 5.0.1 receives mixed reviews

What does the update effect? Earlier this week, Apple released the significantly anticipated iOS 5 patch which aims to solve reported troubles with battery life and cloud syncing issues. The battery life glitch which is one of the most anticipated part of this patch is set to handle a speedily depleting battery on the new iOS  See More..

much more NACHA / ACH / Tax / Payment scam emails

Following on from yesterday s post, there have been several, several more of these emails with slight variations, presumably finishing up with a similar malware infection as before. In the event you get an email like this, do not click the link! Simply delete it.. if you have clicked the link then It is just possible that your  See more..

OpenBTS for mobile malware analysis

within the AV industry, one of the golden rules is to make positive that, during analysis, we do not in any way help the malware authors and/or propagate their offspring.This requires exclusive care within the case of malware for mobile phones, because, on the one hand, numerous of them won t run if the phone is  See More..

Microsoft November2011 Patch Tuesday Released

Microsoft has released only four bulletins covering a total of four vulnerabilities, in its monthly security update. One of the bulletins is rated severe , although two are rated vital and remaining one is rated moderate. As Only one of this month s points is rated severe and it affects the Windows TCP/IP stack. It potentially can  See More..

Don’t fall for the Recovering American Soldier hoax

I ve seen a post flying around Facebook (and so have others, thanks to those Naked Security readers who send us tips!) that for all intents and purposes, has its heart in the right place: When filling out your Christmas cards this year, take ONE CARD and Send it to this address: A Recovering American Soldier,  See More..

FBI investigates Santa Clara University hack which changed exam grades

The FBI is investigating a hack against Santa Clara University s computer system, after a fewone broke into the network and changed the grades of a few undergraduate students. Officials in the University say thin they have reviewed tens of thousands of records dating back to 2000, and have discovered a number of unauthorised changes in grades belonging  See More..

Is this scam email? YES!

The following is diverse spam emails that we received within the last days, it sent using spoofed email address. In case you receive one of this email, don t open, don t click the attached link or open the attachment, simply given that it contains malware. So just ignore it! Dear clients, Your Wire and ACH transactions have been temporarily  See More..

Facebook: Anatomy of Self-Inflicted Javascript Injection

multiple are already familiar with likejacking (a form of clickjacking ) in which a user is tricked into clicking on and interacting with the Facebook like button this has been one of the most Well-liked vectors of abemploying Facebook. For example, the like button may possibly be hidden behind an image such as a imagine of  See More..

Mystery flaw crashing DNS servers across the internet

A zero-day vulnercapability is caemploying BIND 9 DNS servers to crash across the web. The flaw, described as an as-yet undiscovered network event , appears to be a denial of service vulnercapability being exploited in-the-wild. The flaw affects all supported versions of BIND. the web Systems Consortium (ISC) have described The issue as follows: An as-yet  See More..

NASA hacker arrested, perhaps It's time for a few defense?

Romanian police arrested Robert Butyka of Cluj Napoca for hacking into NASA servers beginning in December of 2010. Butyka, who goes by the handle Iceman, is accused of unauthorized access to NASA systems, possession of hacking tools and caemploying the deletion, modification and restricting access to data. The charges allege that the damages caused by  See More..

Facebook clenches fists around users’ data in midst of Irish audit

inside the face of an ocean of users demanding their personal data as required by European Union law, Facebook has sharply constricted the amount of data it s handing over. Instead of sending CDs, Facebook is now directing users to a page where they can download a personal archive, but that archive is now covering only  See More..

Why is Facebook Disclosing a lot less Data to Requesting Users than Before?

some months ago, a group calling themselves Europe v. Facebook emerged. This group consisted mostly of Europeans who were sick and tired of how Facebook allegedly violates a person s privacy and keeps far more data concerning the user than was originally intended. The group, headed by law student Max Schrems, filed 22 complaints with Irelands  See far more..

Facebook Scam- Most embarrassing moment ever in Beauty contest.

There s a brand new scam spreading around in Facebook. The scam spreads by tempting you to click a link that shows the Most embarrassing moment ever in Beauty Contest . The scam has following message Poor girl makes the biggest mistake of her life on a live Contest. With such wording scammer creates fascinating atmosphere and  See More..

Phony Delta, American Airlines itineraries lead to malware

A malware-email outbreak in the past 24 hours uses phony Delta airline itineraries to entice users to click on the embedded links. The social engineering of an attack such as This incredibly is very effective particularly since the email looks very authentic: If you're planning a trip then you this will look all wrong  See More..

Google controversially forces users to opt-out of Wi-Fi snooping

Google is offering to stop mapping wireless access point area data, granting network owners worldwide the option to opt out from its Wi-Fi geoarea mapping. This move follows a decision by the Dutch Data Protection Authority (DPA) that the procedure is in violation of laws in the Netherlands. Google feeds this data into its area  See More..

Starbucks Survey Scam Targets each Facebook and Twitter Users

Late last month we reported about survey scams, and how such threats go across platforms from social networks to mobile. Back then we reported a scam deployed via Facebook, which enticed users into clicking links by offering free Starbucks coffee.We saw a scam quite similar to the one we reported before, except for a few differences.  See More..

dollars from the cloud

Not so long ago we wrote about cybercriminals utilizing infected computers to develop virtual dollars by means of Bitcoin. some days ago we located a malicious technique called Trojan-Downloader.Win32.MQL5Miner.a which as well uses the resources of infected computers, but this time to create dollars in MQL5 Cloud Network, a distributed computing network. The MQL5 Cloud Network  See More..

Tumblr typo leads to iPad offers

Here s a curious instance of a URL similar to Tumblr(dot)com that seems to have been around for a while, capitalising on any typo happy Tumblr user eager to article up an image. Skyrim yes, this thing has been a large deal on Tumblr of late and I noticed when clicking on the below  See More..

Saturday, March 24, 2012

Will tend not to Track make a difference to World wide web privacy?

Earlier this week the world wide World wide web Consortium (W3C) released the quite first drafts of two new privacy standards aimed at simplifying and standardising how World wide websites read and comply with World wide web users privacy settings. The Tracking Preference Expression and Tracking Compliance and Scope standards define a don't Track (DNT) mechanism that could allow users to  See More..

right now is National Unfriend Day on Facebook

Friends is a term that has already been bastardized by social netoperating services such as Facebook. Before, the individuals we call friends typically consisted of a little group of persons with whom we have shared meaningful experiences with. Now, however, our friend lists are saturated with the names of individuals we don t even talk to  See More..

keep your Facebook friends close and your antivirus closer

Facebook malware attacks aren't new. Scams spreading by way of status updates have been around for a long time, but in recent weeks one threat has been Having creative in terms of social engineering. Backdoor:Win32/Caphaw.A can intercept URL requests in both Firefox and Net Explorer and it has been observed to write-up quite personable updates on  See More..

Ultimate 5 TOP Malicious Spam Subjects

Websense� ThreatSeeker� Network detects millions of spam/malicious email campaigns on a eextremely day basis. Such campaigns are sent in ashort period of time, and then disappear for a while.Usually, campaigns will last for about one hour orless, therefore some organizations might possibly struggle with blockingthese emails. under are the top 5 campaignsthat we ve seen over the last  See More..

different money-related spams serve as versatile attack vector to spread ZeuS – The emails and as well the linked website attack the victim in different techniques to spread the harmful banking Trojan

We discovered a series of really nasty spam mails that have significantly to offer. you will find different varieties of it, with different subject, seemingly connected to the geographical areas they are spread in. Let s have a look at an email we discovered in Poland:much more email examples may possibly be located in the bottom of this  See much more..

Senior IPS Researcher

Senior IPS Researcher Posted: 18 November 2011 enterprise name: Sophos Inc Location: Vancouver Canada Travel: occasionally Poster represents: employer Terms of employment: Salaried employee Hours: full time Onsite: yes Description:We re searching for an energetic and experienced Senior IPS Researcher to join SophosLabs the team of computer threat researchers and technique developers located in Vancouver,  See More..

Yet another Cousin of Spitmo: SymbOS/ConBot

Analysts on our Threat study team recently found OpFake, a premium rate SMS trojan that shares code with Spitmo. And this week, our automation flagged a brand new sample. The guys have accomplished their study and it appears that we ve found yet Another cousin of Spitmo. Only, this trojan doesn t pretend to be an Opera update.  See More..

CASEY ANTHONY ADOPTS A BABY | Yet another Hoax by the Weekly World News

The Weekly World News strikes again! This spoof site has been responsible for multiple Facebook hoaxes inside the past. Their latest story spreading quickly on Facebook claims that Casey Anthony adopted a 2 year-old girl from Eastern Europe.Clicking the wall post takes you to the full, yet bogus story:In case you look around this site, you  See More..

Is This SCADA Hacking Friday?

right now s infosec news focuses on several potential incidents of peWebrations at water utility companies. Elinor Mills at C Web posted a story on a potential compromise last week at a Springfield, Ill., water company that can have resulted in physical damage. Meanwhile Gareth Halfacree at thinq has a writeup on a potential South Houston water supply  See More..

Microsoft Security Essentials beta registration opens

nowadays we announce thin the Beta for the next version of Microsoft Security Essentials is open for registration. Do you would like to try out our latest innovations in protection and performance? Are you interested in helping to improve Security Essentials? The number of users than can participate in the Beta is limited, so  See More..

US SCADA infrastructure woetotally unprotected

It has been reported that a SCADA systems failure at a municipal water processing plant may have been cautilized by hackers infiltrating their network. The attackers were repeatedly turning a pump on and off until it cautilized the pump to fail, raising an alert to the operators. Upon analysis they determined that attackers may have  See More..

UK police foiled attack on royal wedding website

Police detained a 16-year-old on Oct. 10 in relation to a suspected attempt to encourage others to commit a distributed denial-of-service attack, in accordance with a spokesman from the cybercrime unit who was quoted in a report from the Associated Press. The spokesman also said that the teenager is out on bail and has not yet  See More..

Dre Armeda: WordPress End-User Security

Sucuri Co-Founder Dre Armeda did a good presentation at WordCamp Chicago about end-user security for WordPress users. pay a visit to the video here: Dre will too be speaking at WordCamp Las Vegas 2011, make certain to say hi If you re attending.  See More..

Compromised Websites unknowingly host malware

The email shown under is a current example of payment rejected emails that have circulated in massive numbers in the past 3 weeks. The links in the email lead to malware similar to that described a previous post. in the example above the malicious JavaScript files were hidden within the folders of a legitimate site:  See More..

straightforward Money: Program:Win32/Pameseg (part 2)

within the previous post, we gave an introduction to how file partnership programs work and how they make dollars off unsuspecting users by charging them for installing software that's the fact is free. In this post, we ll walk you by way of a sample of these paid archives . The following paid archive simulates the appearance of the Adobe  See More..

ZeroAccess Rootkit Launched by Signed Installers

Digital certificates and certificate authorities have been much inside the news recently. Attacks such as those utilized by Stuxnet, Duqu, and other malware involving stolen certificates show an increasingly worria couple of new security trend. Certificate authorities have been targeted several times inside the recent past with a couple of success. There is truly a massive chunk of known malware signed by  See More..

Stealing apps, installing ads

A although back I blogged about offerwalls that were collecting leaked user data. But now it seems that Not merely users are below attack. Recently although browsing Reddit, I found the account of a Well-liked app developer who claims that Another developer on the Android industry had stolen his app, additional ad spam code to  See More..

some work-at-house scams to avoid

Only a genuine idiot would sfinish spam to a spamcop.World wide web address. Here is a genuine idiot: From: Rock Cruit Management 3dhgubesch@hochrather.at Reply-To: 3dhgubesch@hochrather.at date 21 November 2011 18:03 topic Rock Zone Management: Your Job Application is Pfinishing Give the time of day [redacted] Thank you for submitting your Information for prospective employment opportunities. We  See More..

Beware of Your Holiday Travel E-Ticket Confirmation

How does Symantec know it s the week of Thanksgiving? since as the busiest travel day of the year day speedily approaches, the day just ahead of Thanksgiving , there is very a surge in fake email ticket confirmations that lead to viruses. Here is what a fake airline message looks like: In the event you inspect the HTML coding  See More..

Interview with SCADA hacker pr0f concerning the state of infrastructure security

Last week I wrote a story on the compromise of an industrial control system in Illinois that destroyed a pump at a water processing facility. The same day a hacker came forward and posted internal Information on pastebin.com from One more compromised utility in South Houston, Texas. Within hours of publication I was contacted by the  See More..

Evolution of Win32Carberp: going deeper

[far more news from my colleagues in Russia on their study of an interesting product of bank-targeting malware.] This month we identified new Info on a new modification inside the Win32/TrojanDownloader.Carberp trojan family. This trojan is notorious as one of one of the most widely spread malicious programs in Russia, stealing dollars from remote banking systems and primarily  See far more..

Zscaler Likejacking Prevention for Opera

Along with Firefox, Chrome and Safari, Zscaler Likejacking Prevention is now also available for Opera. you can download it on the official Opera add-on site. Zscaler Likejacking Prevention on the Opera extensions site The Opera version works the same as the Google Chrome version, using a similar popup to obtain much more Info concerning the Facebook  See much more..

Fake Firefox: “Introducing the new and improved Firefox 8,optimized for Facebook.”

Here s a fake Firefox upgrade message circulating by email: From: Mozilla Firefox [mailto:firefox-update@plrja5f2.fireefox.com] Sent: 22 November 2011 05:32 Subject: Introducing the new and improved Firefox 8,optimized for Facebook. 211.245.104.78 Facebook recommends the faster Firefox 8. Can t see images? View on a mobile device Facebook recommends that you upgrade to the faster and smarter Firefox  See More..

Spoof ACH mails, neoprenpillar.com and decalintos.com

Yet Another ACH / NACHA / whatever scam email, they go one thing like this: Date: Tue, 22 Nov 2011 10:42:43 +0100 From: The Electronic Payments Association [alerts@nacha.org] Subject: Rejected ACH transaction The ACH transfer (ID: 925071618701), recently initiated from your checking account (by you or any other person), was canceled by the  See More..

Hackers target AT&T wireconsiderably less users

Yesterday, telecommunications giant AT T admitted to customers that hackers have organised an attack against 1% of its wireless account customers. As the 14th largest business in the world, boasting 100.7 million wireless users, 1% just isn't as incritical as it originally may well well sound. Hackers employed auto-script technology to seek out telephone numbers associated with on-line  See More..

Xbox Live customers not hacked but phished

Xbox Live customers are the latest gamers to fall victim to a cyber attack. Thousands of accounts have been hit across 35 countries, with most victims losing between ?100 and ?200, according to The Sun newspaper. But the Sun report that the cybercriminals had hacked into thousands of Xbox Live accounts to steal millions of  See More..

MSRT November: Dofoil

As previously noted, one of the three families additional to the November release of the Microsoft Malicious Software Removal Tool is Win32/Dofoil. TrojanDownloader:Win32/Dofoil is truly a configurable downloader. Dofoil will attempt to receive control instructions from a remote server. The response contains encrypted configuration data containing download URLs and execution options, as visible in a partially  See More..

SOPA undermines security although not solving any problems

a brand new piece of American legislation, SOPA (Stopping on the web Piracy Act) has been Having numerous attention the last few weeks. The purpose of the bill is to put a dent in on the web piracy by allowing the US government to dictate ISPs block access to sites hosting copyrighted materials. The US Congress seems to  See More..

Virus: “Hello! Look, I’ve received an unfamiliar bill, have you ordered anything?”

Here s a piece of quite clever social engineering: Date: Tue, 22 Nov 2011 12:48:52 +0200 From: LILLIE Stinson [accounting@victimdomain.com] To: [victim@victimdomain.com] Subject: demand your help! Hello! Look, I ve received an unfamiliar bill, have you ordered anything? Here is the bill Please reply as soon as possible, simply since the amount is massive  See More..

Google’s open source geezer gets shirty about security

Google s hackerishly hirsute Open Source Programs Manager, Chris DiBona, stormed the IT headlines this week when he stuck his paddle into the computer security world and stirred. In a blog posting which was at least as far above the line in gung-hovity as it was under the line in orthography, DiBona openly referred to vendors  See More..

Friday, March 23, 2012

Phone Text Message Lottery Scam!

It's seen that Advance-Fee Fraud i.e. confidence trick to earn money is utilised by scammers sending phone text (SMS) messages as a indicates of gaining new victims. These (SMS) messages claim that the recipient has won a substantial sum of money in an online lottery as shown below. The texts claim that the “lucky” [...]  See More..

Virus: “Help! I’m in trouble!”

An additional virus-laden email, technically quite similar to this one yesterday: Date: Wed, 23 Nov 2011 08:28:46 +0700 From: Saffi@victimdomain.com To: victim@victimdomain.com Subject: Help! I’m in trouble! I was at a party, got drunk, couldn’t drive the car, somebody gave me a lift on my car, and crossed on the red light numerous times, I’ve just [...]  See More..

Android malware surges in 2011

On 15th november 2011, Google’s mobile working method Android reached 52.5% of the global smartphone market share. And with it an nearly sixfold increase in malware threats. � Gartner's share of worldwide 2011 Q2 smartphones sold to end-users by working method. � � FortiWeb numbers show an increase of 83% for malware creation in 2011 [...]  See More..

b*redret.ru domains to block

a few of the recent surge of spam emails going around uses a set of .ru domains using a discernible pattern of b*redret.ru. Blocking these access to these domains and/or IPs can be a useful proactive step. 173.212.222.54 (Hostnoc, Scranton) buredret.ru 195.254.135.72 (FastWeb SRL, Romania. Recommend blocking 195.254.134.0/23) bqredret.ru btredret.ru bwredret.ru bzredret.ru 89.208.34.116 (Digital Networks SRL, [...]  See More..

The Effectiveness of DNSBLs in an IPv6 world

It's confident that the future of the world wide web communication belongs to the world wide web Protocol version 6, or IPv6. Even although a couple of folks might believe It's new, it’s been around for quite a while; the initial document describing basics of IPv6 (RFC 2460) was published in 1998. The protocol has evolved since, and it [...]  See More..

Thanksgiving: eat the bounty, hang out with household and update World wide web browsers

Thanksgiving is coming up this weekfinish within the US. It’s a holiday of gluttony and household time, celebrating the finish of the summer’s harvest. To coincide with the holiday, The Atlantic have come up using a cute challenge for all of us who will almost certainly be hanging out at our parents’ home: “Update your Parents’ Browser [...]  See More..

Phishing scam threatens to delete Facebook accounts in 24 hours

Facebook phishing emails are threatening to delete users’ Facebook accounts unsignificantly less the victims pass along their account details within 24 hours. The phishing messages are charging Facebook users with violating policy regulations by annoying or insulting other Facebook users. The messages are then requesting personal and financial Information including Facebook login details and part of [...]  See More..

Search Engine Clutter

I’ve been Doing some analysis into the current state of SEP (search engine poisoning) attacks lately — in fact, I meant to do a write-up about Halloween-themed SEP last month, but had at the same time a lot travel going on. So, simply given that we’re approaching the Thanksgiving holiday weekend, and simply given that I’ve completed some write-ups in previous years on [...]  See More..

Fake iTunes gift certificate delivers a load of malware for Black Friday shoppers

Criminals are banking on post-Thanksgiving turkey-eating coma and Black Friday shopping frenzy in the US to trick American Web users to click to by way of to malware posing as a $50 iTunes gift certificate. (Black Friday is the name given to the Friday after US Thanksgiving, when frenzied seasonal shopping usually starts.) The study team from [...]  See More..

Breaking Dawn, Taylor Swift, Image Search: Poisoning, survey scams on the rise

Manipulating search results for trending topics like "Breaking Dawn" and "Taylor Swift" might be a nasty phenomenon that's Having nastier, Producing fraudulent and potentially high-priced results in response to innocent searches. As we described in our Search Poisoning video, the goal of this fraud is to trick people into loading World wide web pages that they would [...]  See More..

Facebook Invitation too as the Olympic Torch

Old hoaxes never die. They just get transplanted to Facebook. Sometimes literally, when a classic email hoax starts to spread with minor emendations through Facebook message or news feeds. In this case, the genuine message (at least, as I received it)�is nonetheless email, but it’s been adapted to appeal to the a lot more than 800�million Facebook [...]  See a lot more..

Phish for Thanksgiving?

Over the previous few days, our investigation team here at GFI has noticed an uptick in bank phishes winding up in a couple of of our spam traps. This particular scam is special in that it comes with an html file attachment which leads to a form that attempts to steal from the unsuspecting victim all [...]  See More..

So now you’re on LinkedIn: What’s next?

By far essentially the most Popular theme for malware emails over the last few weeks has been “interbank payment rejected” or similar. The emails refer to a cancelled or rejected interbank transaction and are alternatively from: Electronic Payments Association ACH (Automated Clearing property) NACHA (National Automated Clearing property Association) These are all essentially the same: NACHA [...]  See More..

Fake jobs: jobinhollandart.com and europjobs.eu

Here are two new domains promoting fake jobs: jobinhollandart.com and europjobs.eu This series of emails seems to be distinct from this one, but the pitch is nonetheless the same – the bad guys are attempting to recruit individuals for money laundering activities and other criminal acts. Date: 24 November 2011 06:27 Subject: Virtuele Manager vacature [...]  See More..

“Rogue browsers will make a comeback on the mobile platform.”

We’ve seen it here first: YapBrowser has risen after being declared dead five years ago-and this discoquite is by Chris Boyd himself just a day ahead of he presented at VB 2011 to discuss about�rogue browsers, of which YapBrowser is. If you missed the said conference or Chris’s presentation, this podcast�hosted by our friends at�Help Internet [...]  See More..

Phone hacking scandal: computer hacker suspect arrested

Yesterday, British police arrested an unnamed 52-year-old man in Milton Keynes for computer hacking related to the phone hacking fiasco committed by the now defunct News of the World and its parent company News International. The unnamed man is being held at Thames Valley police station and questioned for offenses under the UK Computer Misuse [...]  See More..

The Conficker worm, three years and counting

This week marks the third anniversary of the first within the wild samples of Conficker appearing on the internet. In case you recall, Conficker is essentially the most recent typical network worm that started to spread to millions of unpatched PCs in 2008. The first samples detected at the virus testing service Virus Total were spotted in [...]  See More..

Google Secures Searches, Shuts Out BHSEO Scammers

Last month, Google announced that they were Generating search more secure for their users. They announced that users already signed in to Google would have a more secure experience. This meant two things: first, search queries and results would now be sent through HTTPS. This protects the searches of users with unsecured Web connections, such [...]  See more..

Reason to be careful if ‘PayPal’ says you may well have changed your email address

Have you received a notification claiming that your PayPal email address has changed? Messages like the following have been spammed out to Internet users: Subject: you have got changed your PayPal email address Attachment: Personal Profile Form - PayPal-.htm Message body: Dear PayPal Customer, you have got extra [EMAIL ADDRESS] as a brand new email address for your [...]  See More..

VIPRE Black Friday Special

Here at GFI, we’re dedicated to providing quality antivirus software at exceptional values, and this Black Friday is no exception. Our Black Friday Sale features the biggest discounts of 2011 – up to 75% off. Black Friday Sale VIPRE Antivirus 2012 for $39.95 NOW $9.95!VIPRE World wide web Security 2012 for $49.95 NOW $19.95! With prices this [...]  See More..

Will the UK Cyber Security plan make a difference?

The British government has today published its Cyber Security strategy detailing how it plans to Safeguard national security and the public from Net threats, and (hopefully) support the British economy in the same time. The UK’s government plan is to co-operate with the private sector inside the fight against cybercrime, beef up the computer crime-fighting [...]  See More..

Levitator: Root on your Android phone

a couple of days ago, Jon Larimer and Jon Oberheide published a vulnerability for Android platforms < 2.3.6. David Maciejak and I were curious to run it on an Android phone. Result: it runs perfectly So, what is this to us? Well, it’s a new way to root Android phones operating 2.3.4. We already had exploits [...]  See More..

13 million MapleStory players at risk after hack – casting a shadow over Nexon’s IPO

If you’re about to float your video game enterprise on the stock exchange, possibly the last factor you ought to have is for a hacker to break into the personal details of some 13 million of your players. But that’s exactly what has happened to South Korean firm Nexon, which runs the massively-Well-liked MMORPG “MapleStory”. A statement [...]  See More..

How a friend’s hacked Facebook Account can compromise your privacy and security

I had an ironic circumstance happen this past week. A close loved ones member had their Facebook account hacked. Despite all of my warnings and admonitions, this young person I hold dear fell victim to a Facebook scammer. My wife called and asked me why they had changed their name on Facebook. This immediately sent off [...]  See More..

Safeguards for ethical hackers spurned by Australian government

The Australian government has thumbed its nose at legal safeguards for ethical hackers, according to a report from SC Magazine. University of New South Wales security researcher Alana Maurushat on Thursday told the magazine’s “Security on the Move” conference that she and other industry professionals had gone out of their way to submit proposals for [...]  See More..

Spam attack hits Facebook’s own Help Center

The community forum on Facebook’s Help Center has become overrun by spammers, Creating the self-help support community effectively useless. The spam messages, which at the time of writing are claiming to offer techniques to watch live streaming video of American football games, appear to have been posted by bogus or compromised Facebook accounts. Clicking on [...]  See More..

Fake jobs: working-ca.com

An additional fake job domain, working-ca.com seems to be part of this long-running scam. I hadn’t spotted this one before, so thanks to our reader who sent it in. Note that this isn't connected with the legitimate site WorkingCA.com . The jobs offered are in reality illegal activities such as funds laundering. Hello, We have an [...]  See More..

“Look what happens” When you try and watch videos of girls in bikinis on Facebook

The text is in Spanish, but it’s really clear what’s on offer: several kind of video about girls in bikinis. “Mira lo que ocurre” translates to “Look what happens”. Clicking on the video link leads to a page using a “video player” surrounded by diverse forms of Internet advertising. The full title of the video [...]  See More..

25 Worst Passwords of 2011

A password is a secret word or string of characters that's utilized for authentication, to prove identity or gain access to our laptop, facebook, gmail, linkedin and multiple far more similar accounts. Choosing “password” as your on-line password just isn't a great idea. It’s the worst password you're able to mightbe choose, as It is easy [...]  See far more..

R2D2 – Forget the jargon, it’s a wiretap

A short time ago in a galaxy really close by, the German Police and their R2D2 Trojan gave us a fundamental reminder of what modern malware is all about. It’s wiretapping.Technical buzzwords usually leave me a lot more puzzled than enlightened. How numerous of these terms can you identify: backdoor Trojan with mfc42ul.dll, winsys32.sys significant logger, Speex [...]  See a lot more..

Tuesday, March 20, 2012

Cyber Monday spam hits email inboxes

It’s Cyber Monday – the initial Monday after the American Thanksgiving holiday, and traditionally a time when consumers spfinish oodles of dollars purchasing Products online. Of course, if you’re operating in an Workplace today you may possibly need to create certain you don’t over indulge too much on consumerism – Not just simply since it can be [...]  See More..

FP’s Top 100 Global Thinkers

Foreign Policy magazine annually publishes a list of “Top 100 Global Thinkers”. In previous years, individuals such as Carl Bildt, Angela Merkel, Liu Xiaobo, and Tarja Halonen have been on the list. The 2011 list was published right now and includes individuals such as Barack Obama, Bill & Melinda Gates, Bill & Hillary Clinton, and Jens [...]  See More..

Intuit payroll free trial email launches malware attack

Have you received an unsolicited email from – what appears to be – Intuit Supplies Group? Be on your guard.. Malware is being spammed out to Web email users, posing as a message from the payroll software organization Intuit. The emails have the topic line “Your Intuit online Payroll Free Trial”, but attached to the [...]  See More..

Leveson Inquiry hears claims of newspaper computer hacking

The Leveson Inquiry, whose examination into the sometimes dodgy ethics and practices of British newspaper journalists is presently Creating headlines in the UK, has heard allegations of computer hacking. Ian Hurst, a former British army intelligence officer who handled IRA informers in Northern Ireland, has told the Leveson Inquiry nowadays about how he believes his [...]  See More..

WikiLeaks delays much more secure whistleblower system

WikiLeaks has inabsolutely delayed the release of a new method for whistleblowers to remajor anonymous whilst submitting tips, based on a report from The financial Times. a new, far more secure version of the electronic submissions method, which has been offline for a year, was scheduled to roll out on Monday. In its Twitter feed over [...]  See far more..

The New (and Old) .htaccess Attacks – Now utilizing .in Domains

We have been talking about .htaccess redirections for a while. A site gets compromised too as the attackers modify the .htaccess file(s) to redirect any search engine traffic to a diverse (malicious) page that attempts to compromise the browser / computer of anyone visiting the site.For the most part, the attackers have been producing use of .ru domains [...]  See More..

FakeScanti Rogue Hijacks HOSTS Files

Patrick, our resident rogue AV skilled from the AV Labs, have his eyes set on one particular family-FakeScanti. This rogue family quite first appeared inside the quite first quarter of 2010, and it has been withinside the radar ever since. Enter AV Protection 2011. This particular rogue is the latest variant in a handful of noteworthy rogues [...]  See More..

‘Journalists hacked UK government’ – police investigate evidence

UK police have warned a former British CabiWorld wide web minister that they are investigating evidence that his computer has hacked by private detectives operating for Rupert Murdoch’s News International organisation along with the disgraced “News of the World” newspaper. Peter Hain, who served as Secretary of State for Northern Ireland between 2005-2007, has been told by Scotland [...]  See More..

UPS Invoice Notification spam campagin

Another United Parcel Service (UPS) spam pretending that “a new invoice is now available within the UPS Billing Centre. Please refer to attached file for considerably more details” is currently circulating on Internet. The subject is: Your UPS Invoice is Ready. The email comes with an attachment called UPS-Billing-Invoice-Notification-809288436661915.zip. both and efairly claims to be from UPS Billing [...]  See considerably more..

Choose your preferred Fake AV

??? Isn’t it very good when your forecasts come true? Well, sometimes. But maybe not this time. these days I identified a malicious site specially designed to fake three antivirus brands. Kaspersky is top of the list. So, what does it look like? inside the past we’ve seen Rogue AV websites creating use of fake screenshots made with templates [...]  See More..

HP LaserJet printers at risk of fiery hacker attack

Researchers at Columbia University claim to have found a security vulnercapability in “tens of millions” of HP LaserJet printers that could allow a remote hacker to install malicious firmware. In a demonstration of the physical harm that could be carried out by the hack, Columbia researchers Professor Salvatore Stolfo and Ang Cui showed how a compromised [...]  See More..

Facebook worm poses as two blonde women

If you’re a Facebook user be on your guard against the latest worm reportedly spreading on the system. initial located by Danish security researchers at CSIS, the worm appears to have been spread by way of malicious links on the social netoperating site. The danger, of course, is that one of your Facebook friends may have had [...]  See More..

United Nations hacked – email addresses and passwords leaked

Passwords and login details belonging to the United Nations have been published on the web by a hacking group who feel that the UN is guilty of corruption. The TeaMp0isoN hacking gang has leaked over one hundred usernames, email addresses and passwords that appear to belong to individuals at the United Nations Development Programme (UNDP), [...]  See More..

An additional Facebook Fake Foto Attack, on Hacked Russian Site

Unlike humans, who usually need a nap after a big Thanksgiving Day feast, our automated modules significanttain operating away. Either that, or malware has zero calories so WebPulse stays hungry… As I tweeted (@bc_malware_guy) on Saturday, our logs show Yet another “Fake Foto” attack targeting Facebook users, beginning late Friday night (22:43:54 UTC in our significant [...]  See More..

operating on the Holidays

even though the United States enjoyed a long Thanksgiving weekend, hackers continued to battle World wide web security. Fortunately, the automated World wide websenseR ThreatSeekerR Network and staff elsewhere inside the world ensured that systems and data stayed safe.�World wide websense researchers working over the holidays found emerging threats hijacking the holiday spirit. Over 40% of 170 Well-liked Thanksgiving-related search terms had [...]  See More..

FTC settles with Facebook, alleges promises weren’t kept

The United States Federal Trade Commission announced a proposed settlement with Facebook Inc. over their alleged deceptive practices regarding privacy. The FTC launched an research into Facebook after a complaint was filed by the Electonic Privacy Information Center (EPIC) plus a coalition of other privacy groups. The FTC’s research resulted in an eight-count complaint against [...]  See More..

Targeted attacks steal credit cards from hospitality and educational institutions

A small more than a week ago SophosLabs became conscious of a resurgence of an attack against the education and hospitality industries. In at least one case the malware has shown up at a economic services company. a fewthing important to note is that it has only been seen at moderate to small size organizations. [...]  See more..

Manila AT&T hackers tied to terrorist attack in Mumbai

The FBI and Philippines police last week arrested four men who allegedly hacked into AT&T’s customers’ PBX systems after which funneled $2 million in profits to a Saudi-based terrorist group blamed for the attacks on Mumbai three years ago. The Philippines National Police’s Criminal research and Detection Group (CIDG), working with the US Federal Bureau [...]  See More..

Infected Photo Links Can Lead to Banking Trojan

believe twice before you click on any photo links which you receive from your Facebook friends. Danish security researchers at CSIS have discovered a worm spreading by way of Facebook that gives a variant of the Zeus banking Trojan, among other malware. Zeus can steal banking Info and other sensitive account data by logging keystrokes. Compromised accounts [...]  See More..

FLAMING RETORT: Putting out the HP printer fires

Yesterday, Naked Security wrote about a flaming war of words that seemed to have broken out between Columbia University and HP. As MSNBC rather breathlessly asked, “Could a hacker from half-way around the plaInternet control your printer and give it instructions so frantic that it could Eventually catch fire?” - Smoke and fire certainly make [...]  See More..

Malware attack by indicates of iTune Fake emails.

Users are receiving emails which pretends to be from iTune store. These are specially crafted emails, which lure the users by assuring them that they are few lucky ones to be selected for Gift Certificate of amount $50. Further the email asks the users to open the the attached zip file with the mail to [...]  See More..

LEO – the world’s first business software ran 60 years ago today

Who built the quite first electronic digital computer? That ought to be an easy question to resolution – much easier than adjudicating the “Who invented the tablet?” legal spectacular currently playing out between Samsung and Apple in courtrooms around the globe. After all, there was only a handful of computers within the world until the 1950s. [...]  See More..

Fake Cloud AV 2012

There's a brand new frifinish in the village. multiple individuals idea thin the fake antivirus (aka rogueware) enterprise had decreased, and it was true that for some months rogueware infections were not that prevalent, mainly since of the efforts made by law enforcement with the help of security companies, however it was a matter [...]  See More..

Was police chief’s computer hacked by journalists?

A senior police chief has been warned by British authorities that he might have been targeted by tabloid journalists and his computer hacked into. Sir Hugh Orde, who is currently President of the Association of Chief Police Officers (ACPO), was chief constable of the Police Service of Northern Ireland (PSNI) in the time of the [...]  See More..

The Mystery of Duqu: Part Six (The Command and Control servers)

Over the past few weeks, we have been busy researching the Command and Control infrastructure utilized by Duqu. It's now a well-known reality that the original Duqu samples were utilizing a C&C server in India, located at an ISP called Webwerks. as a result of the fact then, An additional Duqu C&C server has been located which was hosted on [...]  See More..

Outbreak: USPS or Royal Mail package email delivers malware attack

SophosLabs has seen a widely spammed-out malware campaign today, designed to trick unsuspecting computer users into infecting their computers with a Trojan horse. The messages use a variety of subject lines, and appear to include adaptions Depending on Whether or not the criminals believe they are targeting a British or American computer user (Brits are lured into [...]  See More..

Chinese Phish Tastes Bitter With Prizes

Co-Author: Avdhoot Patil Symantec is familiar with baits commonly employed in Chinese phishing sites. A grand prize, for instance, is frequently employed as phishing bait. This November, 2011, phishers continue with the same plan by including a brand new iPad 2 for a prize. The phishing sites were hosted on a free webhosting site. The [...]  See More..

considerably more software-related searches lead to malware

Spammers have accomplished a extremely good job a hijacking Web searches related to acquireing software online. significantly more than 90% of search outcomes for “acquire Microsoft Windows” and similar searches, lead to fake stores on key search engines. Not significantly has been accomplished by the search engines to clean up these search outcomes. taking into consideration that the beginning [...]  See significantly more..

Carrier IQ snoops on US cell users – Spyware or service monitoring tool?

Last week a really scary piece of investigation was published by Trevor Eckhart about spyware that's being included on cellular phones within the United States. The commercial software application is called Carrier IQ and is reportedly being used by Verizon, Sprint and potentially other carriers. Carrier IQ was unhappy with Eckhart publishing public copies [...]  See More..

You’ve Got Malware: Deceptive package delireally email for the holidays

Taking deliextremely of an unexpected package containing gifts is one of the joys of the holiday season. Missing a package deliextremely is one of the frustrations of the season. So, an email headed "Failed Package Deliextremely" is genuinely a good way for scam artists and malware distributors to get your attention. In this article I examine [...]  See More..

Thursday, March 8, 2012

Dusty old spam trick employed to sfinish dusty old malware

“Your message could not be delivered”. It’s one of the oldest approaches in the social-engineering-for spam-and malware-emails handbook. you might possibly be receiving notice that an email you sent has not reached its recipient – so sad. And of course the attachment must contain the mysterious email. however it doesn’t. It contains a zipped variant of MyDoom [...]  See More..

Senior analysis Scientist

Senior analysis Scientist Posted: 1 December 2011 business name: McAfee Location: Singapore Singapore Poster represents: employer Terms of employment: Salaried employee Hours: full time Description:- Involved in designing and creating highly scalable malware detection frameworks that analyze incoming malware samples swiftly and block malicious attacks. - analysis advanced and emerging security threats and vulnerabilities. - [...]  See More..

Spammers are stupid

What’s wrong with this spam? Date:� ��� Thu, 1 Dec 2011 17:55:30 +0900 From:� ��� “LinkedIn” [linkedin@em.linkedin.com] To:� ��� Victim Subject:� ��� So now you’re on LinkedIn: What’s next? The ACH transaction (ID: 730771521612), recently sent from your checking account (by you or any other person), was canceled by the other economic institution. Rejected transfer [...]  See More..

Facebook Scam- Lost all respect for Soulja boy after watching him beat up his girl.

There’s a new scam spreading around in Facebook which claims to show a video of an American Rapper DeAndre Cortez better known by his stage name Soulja Boy Tell ‘Em, or simply Soulja Boy, is an American rapper, record producer, actor, entrepreneur, and Net personality. The scam spreads by tempting you to click a link [...]  See More..

Apple Store billing phishing – beware bogus emails!

Phishing isn’t just about stealing your banking details, your PayPal password or even your Facebook login credentials. right now it could be your Apple account that is being targeted too. With more and more folks Getting Apple IDs (utilised by millions for purchasing software from the Mac or iPhone App stores, or downloading music and [...]  See more..

Facebook Worm: ZeuS isn't your (FB) Friend

Danish security business CSIS have reported a worm that really does spread via Facebook, unlike several of the malware we've seen described in hoaxes recently. Peter Kruse tells us thin the worm logs in as the owner of the infected system and spams messages to his or her friends. The message consists of a link [...]  See More..

Holiday phishing season is starting

As in previous years, we are utilised to see a peak in the phishing attacks starting in the beginning of December and ending in the middle of January. If beginning of December makes perfectly sense, you may possibly well have asked yourself why middle of January. since then folks send back the presents they didn’t need to [...]  See More..

Scammers try to trick LinkedIn users with sob story

It’s a terrible situation. One of your friends or work colleagues has gone on urgent enterprise far away, and has been robbed of their credit cards, wallet and mobile phone. But you might be a hero! you are able to rescue them by galloping in to the rescue by sending them a couple of much-needed cash. Of course, it’s [...]  See More..

Free $100 Tim Hortons Gift Card (limited time only)

Scam Signature Message:Free $100 Tim Hortons Gift Card (limited time only)Tim Hortons is currently giving away $100.00 gift cards to all facebook users!! �Scam Type:�Bogus OfferTrending: December�2011Why it’s a Scam:Clicking the wall article link takes you�to the� following page:�This incredibly is lame even by scammer’s standards. Someone clicks on a link for Tim Hortons and instead [...]  See More..

WOAH! my profile was viewed 128 times JUST TODAY, and I can see that I have quite a couple of stalkers LOL! learn yours here

Scam Signature Message:� WOAH! my profile was viewed 128 times JUST TODAY, and I can see that I have really several stalkers LOL! find out yours here bit.lyScam Type:��Rogue ApplicationTrending: December�2011Why it’s a Scam:Clicking the wall article link takes you�to the following Facebook application login screen. ��Clicking the Log In button takes you to [...]  See More..

Android permissions glitch allows eavesdropping, data theft

Researchers have located many holes in Android phones’ permissions-based security that would allow a hacker to snatch data, monitor geolocation, send SMS messages, as well as eavesdrop on conversations. A group of security researchers from North Carolina State University located the glitches in eight handsets from HTC, Motorola, Samsung and Google. The researchers located “explicit capcapability [...]  See More..

บทความที่ได้รับความนิยม

Popular Posts