Support our Sponsors

uClip Clipping Path Service

Main Menu
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions

feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
Chicago Yacht Club Announces About a Major Breach in Security PDF Print E-mail
Written by Administrator   
Wednesday, 20 August 2014 07:00 reported on 8th August, 2014 stating that Chicago Yacht Club has recently confirmed the data breaching of debit and credit cards of their high-profile members.

Chicago Yacht Club was founded in 1875 and based in Chicago, Illinois (US), promotes the sport of yachting. published news on 8th August, 2014 quoting a written letter by Commodore Gerald Bober of Chicago Yacht Club to the members of the club as "Unfortunately the Club has experienced a computer security incident involving your personal information."

The club is having offices at Belmont harbors and Monroe in Chicago with some of the affluent business leaders of the city as its members.

As per Mr. Bober's letter, the computer system of the club failed on 15th June, 2014 calling for an analysis into the crashed computer.

A computer firm was roped in on June 21, (2014) to research the crash identified indicators that malware might have been positioned on one of the servers of the club between April 26- May 22 (2014), states Mr. Bober's letter, as reported by on August 9 2014.

The letter also mentioned that the server used for payments made through the website of the club is hosted by a third party and it is not involved in the incident and bank account and credit card numbers were encrypted. published news on 11th August, 2014 quoting Bober as saying "We don't believe that any information contained on the server has been accessed or used in an improper manner. However, as a precaution, we started sending letters to potentially affected individuals on 31st July, 2014."

Bober also said "If you have used your card at the Chicago Yacht Club during the scheduled time and find any fake charge on your card, please contact the card issuing bank immediately. Major credit card companies normally assure that cardholders will not be responsible for any false charges. Please review your account statements regularly for any unauthorized activity."

The club says that due to the breach, it is restoring its server, probing its practices and safety measures and replacing point-of-sale servers so that unauthorized access does not happen again.

Read more... - Chicago Yacht Club A...
Stuxnet Attackers Even Played Loud AC-DC on Iran’s Nuclear PCs PDF Print E-mail
Written by Administrator   
Wednesday, 20 August 2014 07:00

According to a security pundit attending the BlackHat conference that recently concluded at Las Vegas (USA), the Stuxnet PC-virus whose initial detection occurred during June 2010, notoriously dug inside Iran government's PCs, same year, damaging the country's nuclear program as well as making its nuclear centrifuges self-destructive. The malware even played loud one killer soundtrack in the process, the expert claimed. reported this, August 7, 2014.

Well-known Mikko Hypponen was that security expert who's Chief Research Officer at F-Secure the Finland-based anti-virus company. Hypponen elaborated the way he learned of the unusual incident when he got one e-mail that a scientist from Iran had sent. reported this.

Delivering a lecture during the conference, Hypponen recalled the e-mail stating how many workstations played certain music rather haphazardly at mid-night. According to the writer, the soundtrack came from the AC/DC Thunderstruck music group.

Elsewhere Hypponen stated that the attackers acquired admission into the computer's root component so they could erase every log present. Perhaps, it was a sarcastic gesture on the part of Stuxnet's operators, he conjectured. published this, August 8, 2014.

It might be somewhat unbelievable that the band had been identified as 'AC-DC Thunderstruck,' nevertheless, that's little astonishing for a nation that has banned any rock group, even AC-DC.

In his blog-post, Hypponen wrote that the attackers were probably trying to prove to the scientist's organization staff that they had an incapable IT department. When any employee's PC played AC/DC, the person knew something was happening, while his IT department appeared foolish, since it couldn't stop it i.e. couldn't prevent the malware. Perhaps it was mind games alternatively, the incident didn't ever occur; possibly the guy was simply doing a prank, Hypponen contended. published this, August 6, 2014.

Meanwhile, starting Stuxnet's emergence, Israel as well as USA have been refuting their involvement in it. Also, ever from Stuxnet's assault, Mr. Barack Obama, President of USA admonished the use of cyber-weapons for attacking another country, fearing there might be repurposing of the source codes and utilizing them against USA. Hitherto, the president has not remarked about the perils associated with installing AC/DC.

Read more... - Stuxnet Attackers Ev...
American Taxpayers Feel Tax Scams One Prominent Problem Inside USA PDF Print E-mail
Written by Administrator   
Tuesday, 19 August 2014 11:00

A report that an audit defense firm has lately released states that almost 8 Americans from every total of 10 i.e. 78% think that tax scams can compromise them; however, still 57% aren't aware of the ways that can prevent them against getting victimized, published, August 6, 2014.

Further according to the report, for 88% of Americans, tax scams necessarily pose one vital problem, while 20% stated they'd somebody in knowledge who had got victimized.

The greatest worries for the survey respondents are ID-theft first, then telephone scams followed with spoofed or phishing assaults via websites as well as e-mails that steal personal information, particularly usernames.

Vice-President Dave Du Val of Customer Advocacy of and who's also an experienced expert in Tax and IRS Audit presents certain suggestions as to how one can recognize while also safeguard himself/herself from tax scams. published the suggestions, August 4, 2014.

First, when any caller asserts the call recipient requires dispatching money immediately else he'll dial the Internal Revenue Service alternatively some other government agency, that definitely indicates a scam which the recipient should clearly avoid.

Moreover, if an e-mail/telephone call asserts the recipient's refund is being held up till he confirms his PIN or bank account, that's also one fraud which mustn't be answered.

Furthermore, if an e-mail sender claims he represents the IRS while he's deputed to assist the e-mail recipient get his refund that too must be avoided being a scam e-mail for, IRS never communicates with taxpayers through electronic mail.

Also, if an alleged IRS official solicits personal info, it's best to ask him give his ID-number without revealing the information followed with contacting the IRS for confirming the request alternatively suggesting they send it through written correspondence.

Besides, taxpayers should safeguard their PII (personal identifiable information) against theft by keeping the W-2s tax form as well as other confidential dossiers at some secure location.

Lastly, a taxpayer should be sure of his tax preparer's credentials, verify whether his continuing education is updated, while request him to show his license. Incidentally, majority of tax-preparers inside USA are "un-enrolled" implying they're not credible.

Read more... - American Taxpayers F...
Enterprises Alerted of Malware-Laced Scam E-mails PDF Print E-mail
Written by Administrator   
Tuesday, 19 August 2014 11:00

According to a warning to enterprises and employees situated at South Yorkshire (Yorkshire, Humber Region, England), scam e-mails are circulating, infecting business files with PC-viruses, published dated August 8, 2014.

As per BCRC (Business Crime Reduction Center), there's malicious software inside the scam messages which seeks for deceiving workers into following one web-link leading onto the Internet based file transmission utility, Dropbox.

It maybe noted that BCRC, set up during 1996, offers free and unbiased advice benefiting SMEs (small-and-medium sized enterprises) regarding crime reduction. The Center delivers its service together with People United against Crime, a charity in Yorkshire, police forces of North, West and South Yorkshires as well as Humberside police.

While tricking end-users, the scam e-mails prompt them for taking down a tax-refund alternatively bill payment form, which eventually loads the malware. Following infection, the malware locks the PC files via encrypting them only to demand hefty sums for decrypting them back. The fraudulent e-mails impersonate popular RBS or HSBC banks.

Mark Connell, Cyber Security Expert at BCRC explained that Dropbox was getting utilized for harboring the malware since its trustworthiness enabled the scam electronic mails to appear credible. published this, August 8, 2014.

Essentially, according to Connell, whilst many people treated e-mail web-links with suspicion, there was widespread utilization of Dropbox for genuine business communications.

Elsewhere he said that typical indications the e-mails weren't legitimate were spelling mistakes, grammatical errors as also general greeting of the "Dear Customer" type. reported this, August 7, 2014.

Businessmen are being issued a BCRC alert about refraining from clicking dubious web-links within unsolicited e-mails, answering/forwarding them, alternatively communicating with their senders. Enterprises utilizing Dropbox require increasing awareness about the threat amongst their staff.

Previously in 2014, when Crime Management Head Phil Walker, Detective Chief Superintendent of Humberside Police disclosed that an extremely large company of Humber had been victimized with a likewise assault, he highlighted that the assault had impacted one multi-million-pound enterprise. reported this.

Walker stated the enterprise, which normally dispatched numerous e-mails, had fundamental though not quite effective security, while due to replying the scam e-mail, it very easily got targeted.

Read more... - Enterprises Alerted ...
Dell Released Fresh Details of ‘Lurk Downloader’ PDF Print E-mail
Written by Administrator   
Tuesday, 19 August 2014 11:00 reported on 8th August 2014, stating that Brett Stone-Gross, a Security Researcher at Dell SecureWorks Counter Threat Unit (CTU), recently analyzed and released new details of a malware called 'Lurk Downloader'.

The malware depends on an algorithm drafted to lace images with links directed to command and control server in encrypted form. The images are clear and with the help of code analysis only, the supplementary elements with it could be detected.

Lurk contains two items, one is dropper DLL (Dynamic Link Library) and the other is payload DLL which can extract and execute the payload. published news on 9th August 2014, quoting Stone-Gross as saying that a closer inspection of malware shows that it has some apparently random noise which is the actual malware code extorted after calling some Windows graphics API (application program interface) functions.

It is clear from the analysis that having executed the payload DLL, the tainted computer machine is scanned automatically for the definite presence of anti-virus (AV) products which averts the installation of the malware on the on to the system.

Kafeine, a Security Researcher, first detected Lurk malware back in February 2014. Lurk's previous versions are distributed via an HTML iFrame on hijacked sites, which depend on a Flash-based exploit (CVE-2013-5330) to infect the systems of passing surfers.

The malware employs digital steganography to insert information into a picture, which helps it to evade identification within compromised situations increasing its prolonged existence and making living of security analysts difficult.

The Register published news on 8th August 2014, quoting an explanation of Stone-Gross as that the Lurk showcases the power and flexibility of this technique (referring to digital steganography) and how it can be employed to avoid network unearthing and manual inspection by malware researchers."

He added that due to Steganography it becomes extremely difficult to discover the existence of hidden data like configuration file, bot command or binary update principally in digital files. Due to this, the employment of steganography in malware may become more common in future."

The company's statement confirmed that around 350,000 machines were infected by this malware resulting a loss of quarter million dollars.

Read more... - Dell Released Fresh ...
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1174
The Spamproblem is
Who's online
We have 19 guests online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us