Support our Sponsors


uClip Clipping Path Service



Main Menu
Home
News
Blog
Links
Search
Resources
Windows Software
Mac Software
Hosted Solutions
Server Software
Mobile Solutions
Login



Syndicate
feed-image Feed Entries

spamNEWS | botnet | phising | virus | spam | mallware
‘Be Like Bill’ Might Steal Your Information If You Fall into their Trap PDF Print E-mail
Written by Administrator   
Friday, 05 February 2016 06:00


Security experts have been warning of Internet memes since long time but something happened with the Be Like Bill App raising more eyebrows than usual.

The sketch of a man may pronounce to be John, Timmy, Steve or Jenny or whoever your friends are. But the stickman escorted with a series of sentences describing behavior which is followed by a summary of whether or not that behavior is promising to John, Steve, Timmy or Jenny.

Claim: The "Be Like Bill" Facebook trend exposes users to malware and/or was borne of Infamous intent. As soon as the meme became famous, the website changed its terms of privacy to say: "You will allow us to use, edit your content with our service permanently without any limit and recovery." USAToday reported yesterday that this has prompted a fast response from the US BBB (better Business Bureau) who started an investigation into the practices of the service.

The reaction was exceedingly exaggerated because the website was only asking people about their name and gender and agreed to remove that specific clause from its terms of privacy. A spokesperson of Bloba was quoted as saying "First, our game Be Like Bill does not ask users to authorize a Facebook app."

If you think, your account has been compromised, then change your password. Weupit posted on 30th January, 2016 quoting Facebook as saying "once you have removed the game or app, it will not post to your Timeline anymore." These are all tricks and people behind this campaign are only trying to collect maximum information from users.

Users must avoid any Be Like Bill meme generator which requires more information other than your name and gender. Users should avoid, at any cost, downloading desktop software or mobile apps which create this type of meme or any other meme because there is a high chance that the installer might carry Trojans, adware, PUPs or ransomware which is the mother of all malware.

It can be an easy way to pass the time and scammers can easily get your information also.

Read more... - ‘Be Like Bill’ M...
 
Indianapolis Man Receives Imprisonment for Conducting Global Spam PDF Print E-mail
Written by Administrator   
Friday, 05 February 2016 06:00


An Indianapolis man named Phillip Fleitz recently got arrested and jailed for sending massive spam. Defense attorney Stephen Capone for Fleitz argues that jail would mean overkill against the background of remaining punishments.

Two more defendants, aliased with 31-yr-old Fleitz, earlier got probation, while Fleitz's defense attorney contended that his client should get one likewise punishment. Fleitz accused within the spam attack showed negative result in the drug tests.

Among the twelve USA nationals accused of promoting illicit computer skills via one underground forum that FBI disabled during July, Fleitz happened to be one. Seventy people within USA along with 19 other nations got caught during that forum's shutdown. Pleading guilty, Fleitz said he ran the PC-servers within China which all three accused utilized for hacking innumerable people's PCs inside USA and abroad. Abcnews posted this, February 1, 2016.

Fleitz's spamming operation involved both text-message and computer spam and the two contained web-links. Victims getting text-message received the missive that they were winners of gift cards from Best Buy which were accessible via clicking the web-links. Actually, replying to the message drove the users onto web-pages that Internet Cost Per Action networks controlled. These networks are marketing firms which collect e-mail ids along with more personal info. While these are lawful, utilizing bulk e-mail for driving Web-surfers onto the firms' sites isn't so.

Fleitz said he wanted to apologize. He knew marketing rules were things which made his country great while it was necessary to follow them. He admitted his stupidity for overlooking the act. Fleitz's father, angered with his son's sentencing, stated Fleitz instantly did whatever FBI asked him, as well as presented his statement via a lawyer. However, Jimmy Kitchen U.S. Attorney indirectly said to the judge that Fleitz wasn't that cooperative with FBI while tipped off co-associates within the offense immediately when FBI enquired him.

Showing negative to 3 drug-tests starting December, Fleitz was released on bond. In Defense Attorney Capone's contention that again proved that Fleitz should stay free as also receive treatment.

According to Maurice Cohill District Judge of United States, he sentenced Fleitz to jail so Fleitz could safeguard himself.

Read more... - Indianapolis Man Rec...
 
FinFisher Spyware’s Proxy Server for Indonesia Hosted at Sydney Data-Centre PDF Print E-mail
Written by Administrator   
Thursday, 04 February 2016 06:00


One top-class toolkit to build spyware, FinFisher is a product of Gamma Group that sells the spying toolkit to governments of different countries. The malware is considered as "legitimate" even as it attacks both mobile as well as desktop OSs (operating systems) working like one backdoor against the machines/gadgets it contaminates.

WikiLeaks, during September 2014, disclosed secret documents which Edward Snowden provided. Those documents contained one government list, the purchasers of FinFisher. Earlier, as per reports, twin groups of government entities belonging to Indonesia, one of them Lembaga Sandi Negara (National Encryption Body), among other agencies situated in thirty two nations had bought FinFisher.

Reportedly, it was the government of Indonesia which used the spyware and utilized an Australian data-centre for hosting the proxy server. The Australian Broadcasting Corporation (ABC) said that Australian Officials unearthed one dubious server installed at Ultimo, Sydney based data-centre called Global Switch. The said server ran one proxy that supported Toolkit FinFisher, while vigorously diverted traffic onto one Internet Protocol address registered for government of Indonesia.

The WikiLeaks-published governments list included Indonesia that the research team of Citizen Lab confirmed later within one study it conducted in 2015. With frequently carrying out cyber-espionage operations, Indonesia earned itself a name within the hacking group of entities when during 2013, different hackers' cabals of different countries conducted one partly official cyber-battle. The incidents caused three Australians getting imprisonment.

The cyber-battle got going following WikiLeaks documents revealing how Australia's government performed surveillance operations on Indonesian government. Ever-since therefore, Jakarta authorities have heightened their cyber-competence.

According to security researcher Bill Marczak of a Toronto-situated IT, Human Rights and Security Company, details from end-users whom a department of Indonesia infected were passing through Australia. He told ABC how Indonesia seemed as a very big client of FinFisher. There was also evidence of several other government agencies using FinFisher aside the National Encryption Body. ZDnet posted this dated January 29, 2016.

Similar as the FinFisher toolkit, Hacking Team created malware as well as spyware featured with infiltrating different kinds of platforms and devices while offers the programs for sale to businesses/governments across the globe.

Read more... - FinFisher Spyware’...
 
Linux Computers Becoming Increasingly Malware Prone PDF Print E-mail
Written by Administrator   
Thursday, 04 February 2016 06:00


Linux PCs that for long were regarded as virus or malware proof, have now become targets of malicious software with the attacks happening regularly. The Trojans created for Linux allow cyber-criminals to get hold over Linux machines and launch instructions onto them.

Dr Web the anti-virus vendor based in Russia explains Linux Trojan as having dual sections. One component acts as a dropper which is programmed in the Free Pascal computer language and is tasked to contaminate the PC followed with downloading the other part that's the real payload or the backdoor featured Trojan's key portion written in C language.

Dr. Web's malware researchers recently detected one fresh Trojan that targets Linux computers and captures screenshots as well as logs keystrokes. They state there are indications which tell that the Linux.BackDoor.Xunpes.1 named spyware for Linux has dual sections. It's pretty common to find the dropper component that has been utilized for other malicious programs. Meanwhile, the backdoor element consists of support for multiple commands even though it is tiny in size. Techworm posted this, January 26, 2016.

When launched onto a target PC, the malware's controller effectively issues his ware more than 40 separate kinds of commands for the contaminated host to obey. Each of the commands is transmitted via one command-and-control infrastructure that lets the backdoor's operator stay semi-anonymous.

During the past week, one likewise Trojan having features of screen-grabbing too was detected. That one called Linux.Ekocms, dramatically acted as a first Linux malicious program having wholly working screengrab abilities.

Even scarier was the Linux.Encoder ransom malware, which terrorized server administrators during recent months. Luckily, security experts at BitDefender were able to repeatedly brute-force into the ransomware code. Besides, to remind is the XOR DDoS malicious program as well as Trojan Linux.Rekoobe that too attacked Linux computers alone.

There was a time when Linux operators imagined their OS was free from malware attacks and so superior to other OSs, but no more now. For, the cold reality is that Linux wasn't ever supernaturally invulnerable. Besides, as Linux operating system gets increasingly popular, malware owners expectedly focus their resources onto this valuable OS.

Read more... - Linux Computers Beco...
 
Sixty-plus Android games on Google’s PlayStore Detected having Trojan PDF Print E-mail
Written by Administrator   
Thursday, 04 February 2016 06:00


Security researchers have found multi-dozen game applications inside Play Store of Google contaminated with a Trojan known as Android.Xiny.19.origin. The malicious software has been created for downloading, planting as well as executing programs as per hackers' instructions.

The researchers belonging to Russian security vendor Doctor Web state that Android.Xiny contaminated over sixty games. While not really naming those applications, the researchers state that more than 30 developers distributed the games, including BILLAPPS, Fun Color Games and Conexagon Studio. Gamers taking down any game from the Store lost personal information to the hackers that the Trojan collected and transmitted onto one remote CnC (command-and-control) server.

After transmission of the personal information, Android.Xiny's controllers, depending on what specifications are on the victimized gamer's phone, would issue command to the Trojan for exhibiting advertisements inside the browser-screen of the user alternatively, making its stay more persistent via pulling down other malevolent applications.

Among the many malicious operations the malware carries out, one is asking end-users to load various program software as well as load or erase apps devoid of taking the end-user's permission. These will depend upon if there's root access. While root privileges maybe pending, the Trojan may load software followed with downloading attack codes that are on the CnC system for acquiring root access.

Of all personal information the Trojan would collect, IMSI and IMEI identifiers are included along with language and country configurations; mobile operator details; MAC address of the phone; operating software edition, the memory card type used on the device; as well as the application from where the Trojan garnered the entire information. The details regarding the device's memory card are made accessible to the hackers. Android.Xiny also pulls down and executes random .apk files after getting the hackers' command. Ibtimes.com posted this dated January 31, 2016.

Previously during January itself, Lookout the cyber-security company detected a malware called Brain Test which infected thirteen Android apps. Google, however, quickly eliminated those infected applications.

This Google did knowing that security investigators carrying out reverse engineering, instead of doubting a graphic download would actually concentrate on examining HTTPS traffic and tracking the same.

Read more... - Sixty-plus Android g...
 
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 1 of 1363
Polls
The Spamproblem is
 
Who's online
We have 106 guests and 7 members online
News Flash
How do you fight spam?

Spam is a growing pain. How are you combating spam?

Submit your favorite spam fighting links to us