archives
August 2010

Support Scams On The Rise (2)

The problem with preventing such scams is that social engineering is very lo-tech in nature, requiring little in the way of technical resources and investment. Scammers are relying on the victims naivety, to grant them access to their computer and credit card details, so there’s very little a security company can do to prevent them,

Support Scams On The Rise (1)

Urban Schrott, IT Security & Cybercrime Analyst, ESET Ireland, contributed an article to ESET's July ThreatSense report about support scams. Since this is an issue that is still being under-reported, we thought it was worth reproducing, with the urbane Mr. Schrott's permission, on the blog. While we're on that topic, there's a video worth watching

One Billion Blocked – Malware and IE 8

Every layer of protection you add will harden the target against cybercrime. SmartScreen technology found in Internet Explorer 8 has recently clocked over 1 billion blocked potential malware downloads from malicious sites. By way of Terry Zink’s blog: 1 billion malware blocks is an amazing milestone and an example of two things. First socially engineered

Multi-level Cybercrime

I just blogged about a potential new Facebook worm. It may turn out that it is not a worm, but another type of attack that involves multiple levels of criminal organizations, which to some degree are being aided by the privacy laws in the Holland. To begin with there are stolen credential attacks. The two

Is Facebook Making a Funny Face?

There may be a new worm on Facebook today. Unfortunately I don’t yet have enough data to be conclusive. A friend received an IM from a friend on Facebook that said “Hey i just made myself a cartoon omg lol ill show you but you gotta do urs too” The IM also included a link

Assessing Intent

There have been recent articles with fantastic titles such as “New threat: Hackers look to take over power plants” and “Hackers Target Power Plants and Physical Systems” in the wake of the Stuxnet worm that targeted certain industrial control systems (ICS). The reality is that hackers targeting ICS is nothing new. I am not clear

Social Media: Another Survey

The survey asked just two questions:
1.Does your organization have a formal/written social media acceptable use policy?
2.What level of access does your organization allow to each of the follwoing social media sites: Twitter, Facebook, YouTube, LinkedIn, Blogs, and Other?

Who is Downloading the Facebook Data?

Gizmodo ran a story about who is downloading the files with the information about 100 million facebook users.   http://gizmodo.com/5599970/major-corporations-are-downloading-those-100-million-facebook-profiles-off-bittorrent It turns out that lots of people are. The story says companies, such as Motorola, IBM, Apple, and Disney, among others, are downloading the data. Organizations such as the United Nations made the list as well.

Who is Writing the Viruses?

Hitler is alive in South America. Jim Morrison is alive and living in seclusion on a mountain somewhere. Conspiracy theories never die and tend to live forever in the minds of the irrational. I recently received the following question: “Some people say that the AV company itself (ESET, Kaspersky, Symantec ..) also writes viruses! How

How to Lie to Your Bank and Get Away With It

While we talk about the periodic leakages of personal information from Facebook and how that information is leveraged by cybercriminals, the community of Facebook users can change their ways. Let’s pair up victims with criminals based on what’s broadcast by the victim. Here are Facebook’s seven deadly sins matched up with the most likely categories

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar

Archives

Select month
Copyright © 2013 ESET, All Rights Reserved.