Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Members of Scotland Supporters Club Recipients of Spam Mail PDF Print E-mail
Written by Administrator   
Friday, 09 December 2016 08:00


A spam mail carrying an invoice landed into the inbox of members of Scotland Supporters Club directing to pay 170 pounds before or on December 7. Asserting to be the Club's accounts division, the e-mail said that recipient should click on a given payment web-link, but it turned out to be a fake URL. Heraldscotland.com posted this online dated December 5, 2016.

According to Daily Record, several coaches too got one similar e-mail supposedly from SFA's department which handles training courses. Following complaints from the recipients of the spam mail, SFA released a warning on Twitter telling fans they should overlook the message as well as delete it. The warning requested the site visitors to know that a fake e-mail was in circulation posing as a message from Scotland Supporters Club.

The Association on its official site issued an apology to people receiving certain spam mail in the morning posing as a Scottish FA message while containing one web-link via which to pay a pending bill.

It further stated that all recipients were advised towards erasing the e-mail instantly while anybody who might've viewed it to put their PC under a security scan for making sure no malicious program had gotten installed. Moreover, all supporters were being assured that there hadn't been any leakage of credit card or bank particulars. The problem had been apprised to the Association's vendors too, it added.

Astonishingly after this incident, one separate fan club known as Scottish Football Supporters Association condemned China for the problem. On Twitter, this association posted that seemingly hackers targeted the membership accounts of @ScottishFA fans, with the source code originating out of China. In that connection, the association had contacted the fan members to provide information.

Fans of Tartan Army, in the meantime, have been disseminating a message on social networking websites regarding the scam that has consequently created apprehensions that pressing on the web-link was likely to contaminate their PCs with malware.

There are over 29,000 members in the Scotland Supporters Club who are beneficiaries of confirmed tickets for home matches as well as sole access to outside home game tickets.

Read more... - Members of Scotland ...
 
Saudi Apex Bank PCs Hit with Malware Linked to Iran PDF Print E-mail
Written by Administrator   
Friday, 09 December 2016 08:00


The central bank of Saudi Arabia was recently struck with Shamoon a most damaging disk-erasing malware which impacted the PC-networks of several government agencies during the last 2 weeks, thus posted ibtimes.co.uk online dated December 3, 2016.

While there was constant surveillance for identifying potential cyber threats against the apex bank, there was reportedly no breach of the systems at the bank, the bank stated.

The assaults that troubled no less than 8 government agencies employed one computer disabling malicious program called Shamoon which has been associated with Iran, said two persons aware about a still going probe into the hack. Shamoon was capable of inflicting destruction against entities from many critical sectors, in particular, transportation and finance.

SPA the national news agency of Saudi government reportedly informed that the assault seemingly emanated externally of the Gulf nation state while was among many still existing cyber assaults attacking government offices even as it quoted the National Cyber Security Center, according to Reuters the international news agency.

Several security companies, prominent among them, CrowdStrike, Symantec, Palo Alto Networks and FireEye too cautioned about last month's assaults. Referring to dual unidentified sources, Bloomberg reported that state-backed hackers executed the assaults, and added that as per digital clues, their source of origin was Iran.

Moreover, in addition to the General Authority of Civil Aviation that operates airports in Saudi Arabia, the hackers attacked the transportation ministry that oversees road network of the Kingdom.

Saudi Arabia's central bank like most central banks supervises the kingdom state's commercial banks, handles foreign exchange currencies, as well as operates the system of electronic payment.

Symantec explains that Shamoon spreads across the target network through many stages. Foremost of all, a 'dropper' activity proliferates onto multiple PCs, after which it pulls down a driver for enabling its evasion of Windows API followed with rewriting everything on the computer's hard disk. Eventually, Shamoon sends verification message to the hackers' remote server telling that it has successfully wiped the disk.

The probe within its initial phases could mean changed responsibilities. There is also possibility of increased entities being damaged as investigation goes on.

Read more... - Saudi Apex Bank PCs ...
 
Scammers Abusing Windows Support Use VindowsLocker Ransomware PDF Print E-mail
Written by Administrator   
Thursday, 08 December 2016 08:00


One non-chargeable decryption code from Malwarebytes is designed towards helping victims targeted with new ransomware assault regain lost data after online crooks have carried out one scam technique based on 'technical support.' Dubbed VindowsLocker, the recent strain of ransomware emerged last week. To perform, the ransom software builds a connection between the victim and an imposter Microsoft technician that results in encryption of the victim's files with the aid of one Pastebin API.

Attacker carrying out the scam first makes a phone call to the victim and supposedly describes himself as certain support technician from Microsoft who is checking up a malware contamination alternatively reports about errors on victim's PC. After this, the imposter directs that the victim should take down one diagnostic tool from the Net, often one genuine remote support application such as Teamviewer or LogMeIn Rescue. The download helps make a connection with the host PC that subsequently enables complete the attack.

Security researcher Jakub Kroustek from AVG identified VindowsLocker whose moniker he decided on the basis of .vindows file extension the malware included at the end of an encrypted file. VindowsLocker utilizes AES algorithm for encrypting and thus locking files which depict extensions such as docx, doc, text, ppt, xlsx, xls, jpg, odt, pptx, sql, csv, png, php, sln, mdb, xml, html, aspx, and asp.

More research has shown that VindowsLocker isn't really a ransomware of the typical kind rather it's only one encryption code created for making a joke. Nonetheless, the malware increases confusion and scares victims into paying large sums. Forbes.com posted this, December 2, 2016.

A victim viewing fake Windows support page is told to provide his banking credentials and e-mail id for processing a $349.99 payment for freeing his PC. But, the payment does not restore the files to the original user, says Malwarebytes. That's because the makers of VindowsLocker fail in automatically decrypting the contaminated PC because of certain coding errors.

VindowsLocker ransomware developers, according to Malwarebytes, have spoiled an API key which could be utilized during short sessions. However, decryption tools have been issued capable of undoing VindowsLocker's destruction, thanks to security professionals.

Read more... - Scammers Abusing Win...
 
Spammers Attack iPhone Users with Fake Sales Events PDF Print E-mail
Written by Administrator   
Thursday, 08 December 2016 08:00


During past few weeks, people using Apple's iPhones reported getting invites for fake sale events of items like Ray-Ban Sunglasses costing $19.99 or Ugg boots carrying 50% discount. The invites came devoid of alerts provided within the users' calendars, usually accompanied with noisy announcements about the date and time of the event's start.

Spammers exploited one convenience feature within which iPhone users' iCal application automatically picks up the invites sent to them while places all details about the meetings inside their calendar. Thus, the current wave of invites is really iPhone spam referring to fraudulent missives which promise attractive sales at steep-down prices over one short period. Spammers as well dispatch invitations which get to appear inside users' calendars, transmitting notices about online events and sales. Wbaltv.com posted this, December 4, 2016.

Meanwhile as different from junk or spam folders, there isn't any filtering mechanism that Apple provides to its consumers on their iPhone calendars, implying the calendar cannot distinguish a phony event from an actual one. This problem thus prompted a spokesman for Apple to express regrets for those affected as he spoke to Wall Street Journal.

However as per recommendation from TechCrunch, one fresh and different calendar can be created into which spam events can be filtered. Unsolicited messages can get channeled into this freshly constructed calendar after viewing any invite while opting for destination of the fresh calendar followed with doing the same for rest of the invites that the spammers may dispatch.

For all recipients of likewise deceptive promotions on their Apple smart-phones, it's being cautioned that they should click neither any of "decline," "accept" or "maybe." That's because clicking either will merely indicate to the spammers that they've reached a live account, so the messages must be ignored.

Incase of Photo Sharing, users must disable iCloud synchronizing features such as opening "settings" menu followed with clicking "disable" to turn off iCloud Photo Sharing.

Overall, users are advised against disclosing their debit/credit card information except when on a genuine website. They can also block e-mail ids that come up within their text messages via opting for "block this caller."

Read more... - Spammers Attack iPho...
 
Congress Criticizes Government on Hack Attacks of Twitter, Worries for Breach of Server PDF Print E-mail
Written by Administrator   
Wednesday, 07 December 2016 08:00


Rahul Gandhi's Twitter account was hacked on Wed. evening; and then put out homophobic and offensive posts. On the next-day (i.e. Thursday morning), the account of the Congress party was also hacked and offensive tweets are posted. On Thursday, the hacked account matter of Congress VP was referred to the cyber cell.

As per sources of Twitter India, the account of Congress number 2's was "compromised through an email breach".

The police have been informed by the party that the email account of Mr. Gandhi, Twitter page of the Congress, its website, as well as server are all hacked in between Wednesday (9:30pm) and Thursday (10:00am). Ndtv.com posted on December 1st 2016 that the hacker's base might be outside India and by using the proxy server, as per the Delhi Police sources, which sent questionnaire to the Twitter.

The terrible news does not conclude here. The hackers also indicated that this breach was far bigger, and emails as well as correspondence of confidential and private internal party cache might soon be found on public platform like Wikileaks. Sources claimed that the server hosting the website of Congress and e-mail accounts are hacked, thus indicating that the confidential data was compromised.

Hackers allegedly posted in one tweet via @INCIndia, which read "coming up a full dump of inc.in congress emails, stay tuned for Christmas special." All offensive tweets got removed within few minutes.

The messages are also removed soon. After the hack, Congress has questioned the digital protection and safety of every Indians by saying that it shows disturbing insecurities of existing "fascist culture" in India.

The government began the investigation, and also asked for all user details who logged on to their accounts during last week. On Thursday eve., the official website of Congress, inc.in also looked to have gone offline.

Same report also mentions that both the accounts lack features of additional security that the Twitter offers, and the accused might have the access to email addresses connected to the accounts. As per senior party leader: "hacking will always be an issue but as we move towards digital economy, you must ensure accounts are not hacked. The government must assure systems are in place."

Read more... - Congress Criticizes ...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1471
Polls
The Spamproblem is
 
Who's online
We have 86 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us