Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Attorney of West Virginia Warns Students about Fake Job Opportunities PDF Print E-mail
Written by Administrator   
Tuesday, 01 September 2015 07:00


Huntingtonnews.net published news on 23rd August, 2015 stating that Patrick Morrisey, Attorney General of West Virginia, cautioned college-goers to be careful about scams offering bogus job opportunities.

The Federal Bureau of Investigation (FBI) has often warned about email scams wandering around colleges offering "work from home" opportunities particularly targeting college students. The notifications have been found targeting students via their school email accounts.

Heralddispatch.com published news on 22nd August, 2015 quoting Attorney General Morrisey as saying "many students look for convenient and good-paying jobs to earn some extra money while following their studies. We would like to be convinced that people should know what to anticipate and how they can protect themselves particularly because several employment scams often appear to be genuine opportunities."

In this kind of rip-off, the student will apply for a designation (like a rebate or payments processor, trading partner or currency trader) via an unwanted email or online job website.

Students will then get an email instructing them to submit their banking details so that capital can be deposited in their account.

After that, the student is asked to transfer a part of funds to another bank account. But, by following all these instructions, the student puts himself or herself at risk of getting cheated of money and becoming a victim of identity theft or probably even getting involved in a criminal money laundering plot.

Moreover, the money supposedly being deposited may not be genuine or swept from the account which could build a situation wherein the student ends up paying overdraft fees.

If you believe that your identity has been compromised or you have been scammed, then call up Consumer Protection Division of Attorney General at number 800-368-8808 or the Eastern Panhandle Consumer Protection office in Martinsburg at 304-267-0239 and to file a complaint online, you may visit www.wvago.gov.

Unfortunately, this is not the first time since the beginning of 2015 that West Virginian AG has requested college students of West Virginia to be careful about work-from-home job scam emails because he had issued a similar advice even in February 2015.

Read more... - Attorney of West Vir...
 
Tax-themed Scams are Targeting Residents of Niagara PDF Print E-mail
Written by Administrator   
Tuesday, 01 September 2015 07:00


Stcatharinesstandard.ca reported on 20th August, 2015 stating that the Niagara Regional Police (NRP) Ontario, Canada is reiterating its warning to residents to be careful of tax scams.

Stcatharinesstandard.ca reported on 20th August, 2015 quoting Sgt. Paul Spiridi as saying "NRP continues to receive several complaints from residents who have been targeted by many common tax scams."

Victims have been targeted with hoax phone calls and scam emails from individuals claiming to work for the Canada Revenue Agency. The impostor asks for personal information like social insurance numbers and banking information to either deposit refunds or make payments towards due tax.

In some cases, victims are informed about outstanding balance which, if not paid immediately, will result in arrest, deportation or seizure of vehicles, homes, bank accounts and other assets.

Criminals demand payment via the purchase of pre-paid credit cards or e-mail transfer.

Spridi said that these kind of communication are meant to produce a sense of urgency and stress.

Spriti added: "We put out some information around tax time but it is still going with full force as there are many reports coming in from public through calls at our front desk and we have had reports of some significant losses also."

In order to make their claims more authentic, the scammers frequently apparently use logo of official tax department, copyright notices and secondary links which lead to the legitimate website of the tax department. Internet users should be very careful about any emails that claim to be from their country's tax department (like CRA in the above case) and ask them to submit personal information by clicking on a link or opening an attachment. Genuine taxation organization (like CRA of Canada in the above case) will never inform taxpayers about a possible refund and will never ask them to submit personal information through an unsolicited email.

However, this is not the only case of tax-themed scam email which has been reported from Canada as during second half of July 2015, police in Kelowna (British Columbia) received many complaints of different 'phishing' scams claiming to be from Canada Revenue Agency (CRA).

Read more... - Tax-themed Scams are...
 
Which? Research Reveals that Phishing Emails Averaging at 20 a Month PDF Print E-mail
Written by Administrator   
Tuesday, 01 September 2015 07:00


Eandt.theiet.org recently reported on 20th August, 2015 quoting consumer watchdog Which? as "research reveals that people receive up to 20 phishing emails in a month with many involving sophisticated imitators of government departments, major companies and banks."

The consumer watchdog asked 25 members to log all scam calls, emails and letters they have received during a month totaling 447 with 95% coming through email.

The research also discovered two versions of scam emails. One version of hoax email received asserted to be from HMRC informing the recipient about a due towards a tax return while others asserted to be from Government Gateway.

The authentic Government Gateway website is employed to access government services like those for tax self-assessments.

Read more... - Which? Research Reve...
 
“Vietnam Rose” Porn Virus Spreading Among Indonesian Users of Facebook PDF Print E-mail
Written by Administrator   
Monday, 31 August 2015 15:00

Jakarta.coconuts.co published news in the last week of July 2015 quoting security experts as saying "malware (short for "malicious software" which can take control of particular operations of your PC) virus known as Vietnam Rose has been currently spreading via Facebook mainly among Indonesians."

Vietnam Rose is infecting users when they click on links camouflaged as pornographic images posted on FB. When users click on the photos, they are driven to a site which spontaneously downloads the malicious software onto their systems which then takes control on the user's FB account and posts additional pornographic links as many as 5 to 10 times per day through their accounts.

In spite of being called Vietnam Rose, majority of infected users are located in Indonesia apparently because the malicious software links were initially posted onto specific closed Indonesian FB debate groups where they could freely spread.

Actually, Vietnam Rose is just only the first such malware to strike Indonesian Facebook accounts as there was a matching malware trap hidden as Gadis Mabuk XXX (Drunk Girls XXX) which spread across Indonesian bends of the social networking site towards the concluding days of 2014.

Jakarta.coconuts.co published news during the last week of July 2015 quoting Alfons Tanujaya, an Antivirus Expert of Security Firm Vaksincom, as saying "Vietnam Rose is much more dangerous as compared to Drunk Girls and you could say that it is nine times more worse."

Security experts claim that unfortunately incidents like the above one have constantly defamed the image of Facebook.

It has been observed that Facebook is highly vulnerable because, firstly, the content of Facebook spreads like wildfire with limited number of employees working for Facebook resulting slow follow up.

Secondly, people have subconsciously started believing Facebook much more because of its popularity and due to the fact that it has been existing almost for the last ten years. This makes Facebook totally different than other websites existing on the large cloud of Internet; making it difficult for general people to understand the fact that websites linked to the network are hosted externally and that porn videos posted there are no less likely to carry malwares or viruses than those found away, as explained by experts.

Read more... - “Vietnam Rose” P...
 
Flash Exploits Malign Hacked WordPress Websites - Zscaler PDF Print E-mail
Written by Administrator   
Monday, 31 August 2015 15:00

Internet security company Zscaler spotted a new campaign which uses compromised WordPress sites to redirect users to websites hosting Flash exploits.

This new campaign appears to be using the Neutrino Exploit Kit and uses a combination of hacked WordPress sites, Internet Explorer, hidden iframes, a hacking Team Flash exploit and CryptoWall ransomware.

Researchers of Zscaler are explaining that the starting point of this new campaign exists in more than 2,600 hacked WordPress sites to which attackers have gained login credentials and have infected more than 4,200 pages with a hidden iframe that mutely redirects users to landing pages which are infected with malware.

As a common design, all hacked WordPress sites appear to be running a version of CMS (Content Management System) of 4.2 and prior to that.

On these landing pages, a single Flash SWF file is served but only to users of Internet Explorer and only once, file which leverages the CVE-2015-5119 Flash zero-day exploit to infect the PC of users with a CryptoWall ransomware.

Researchers of Zscaler observed that the initial Neutrino Flash SWF file contains a secondary SWF which is ultimately used to deliver the malware payload.

Securityweek.com published news on 22nd August, 2015 quoting Zscaler as saying "This operation also reconfirms that Neutrino EK (Exploit Kit) action is increasing and it is still a major competitor in the exploit kit field."

Angler remains the most dangerous as its keepers rapidly incorporate exploits for newly reported zero days and this recent increase of Neutrino traffic could be linked to several reasons: maybe this actor was expelled from buying Angler; a sharp change in pricing; or this could just be a test run using Neutrino.

Threatpost.com published news on 21st August, 2015 quoting a statement written by Brad Duncan, Security Engineer of cloud computing company Rackspace and SANS ISC handler as: "If this change highlights a trend, we might see a large number of hijacked websites pointing to Neutrino EK along with a simultaneous drop in Angler EK traffic. However, criminal gangs using these EKs have hurriedly altered tactics in the past and circumstances might vary by the time you read this."

Read more... - Flash Exploits Malig...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1307
Polls
The Spamproblem is
 
Who's online
We have 108 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us