A “particularly unpleasant” phishing email purporting to be the results of a blood count report showing that the recipient may have cancer is circulating. It seems to be sent from a government health care organization – but it’s a malware-laced scam.
ESET’s Threat Trends Predictions report for 2014 found new Android malware increased 63% from 2012 to 2013 – so If you’re a user ‘switching sides’ from an Apple iDevice, you might be alarmed. But a few sensible steps are all it takes to stay safe on Google’s OS…
Here’s a brazen fake antivirus program that falsely declares you are infected, then locks your screen and asks you call a toll free number for Support, which then asks you to pay to remove the fake infection.
Valentine’s Day is fast approaching and romance is in the air. Love is also blooming online, but sadly, so are romance scams. We have covered romantically-themed online scams in the past. These include attempts to spread malware through Valentine-themed links on social media, search engine poisoning, phony gift cards, and fake e-greeting cards. Today we
If the smartphones of ESET bloggers are any indication, scams executed via SMS text, known as smishing or SMS phishing, are on the rise. I don’t do a lot of texting, which makes a smish easy to spot on my phone, but I just read an amazing statistic from a Pew report: Users 18 to
When a direct message pops up on Twitter stating that other people are saying bad things about you, please think twice before clicking on any links in that message. Why? Because the links are likely to take you to malicious websites that are out to steal your Twitter password. They may also try to infect
Los ataques de scam, así como los de phishing, utilizan la ingeniería social para engañar a la víctima, y lograr así que esta descargue una aplicación maliciosa, brinde sus credenciales de su cuenta bancaria o lo que el atacante desee. Debido a esto, los ataques que utilizan Ingeniería Social son muy peligros debido a que
Scam artists and cyber-criminals welcomed today's news of the demise of Libyan leader Muammar Muhammad Abu Minyar al-Gaddafi (often referred to as simply Gaddafi or Gadhafi). Why? Because few events fuel Internet search activity as much as the death of a famous–or infamous–person, although celebrity weddings and divorces are also a big search driver. It's a
If you're a dedicated follower of Facebook, last week was a bit of a roller coaster. On Monday, Emil Protalinski at ZDNet reminded you that the stories appearing on Facebook about Lady Gaga being found dead in a hotel room are a “likejacking” scam. Then on Tuesday it was reported that Facebook has "introduced a
Here's a diagnostic window that your shouldn't panic over, certainly if some cold-calling scammer directs you to it by persuading you to run a diagnostic on your own system. But I'm getting ahead of myself. You might think I've blogged more than enough about support scams already – you know, where someone calls you out
La curiosidad de muchos usuarios por conseguir la contraseña de alguna persona, es algo que los atacantes suelen aprovechar a su favor, ya que así suelen llamar la atención de las víctimas. A causa de esto, en muchos casos las personas terminan convirtiéndose en victimas de servicios fraudulentos o sufren el robo de información sensible.
Muchas veces la sencillez de un mensaje con un contenido llamativo, puede llegar a generar una gran cantidad de víctimas. En este caso vamos a compartir con ustedes un nuevo hoax, el cual se propaga por la red social Facebook. Se define hoax a un mensaje falso, que se distribuye masivamente con objetivos inofensivos al
Nuevamente encontramos que en distintos medios de prensa, se hizo eco sobre una nueva amenaza que se estaba propagando por la red, en este caso la afectada fue la red social de Twitter. Dicha amenaza, la cual utilizaba una de las diversas técnicas de Ingeniería Social, empleaba el llamativo mensaje indicando saber quién visito nuestro
You have to be a real cool cat to get into the Cambridge Who’s Who registry. A few months ago I received a spam message from email@example.com. A legitimate Who’s Who organization is very unlikely to be using a Gmail address and they wouldn’t have sent the email to AskESET. Here’s the email: You were
I recently read a column on Chris Elliott’s travel site warning of a truly dishonest and despicable practice that Yahoo Travel and Travelocity are engaging in to attempt to trick people into buying trip insurance. When you go to these web sites and book a trip the screen shows you the price of the trip
Round here, we're more than a little concerned about fake/rogue antivirus (and other fake security software). It's an ugly form of ransomware that hurts its victims in many ways. It scares them by threatening dire consequences and damage from malware that doesn't exist (except in the sense that the fake AV is itself malware), in
As more information and discussion has come in on this, it now merits an update in its own right. It seems that there is at least one other unnamed app around as well as the Boxes issue, and while I've no reason to assume that it's malicious, I'd hardly advise that you rush into installing
I received a fax today. Now, that may not be worthy of noting on here, apart from the fact that I hardly ever receive faxes these days. But the interesting fact is that it was sent to my US based fax number and offered me a great deal on a "New Health Plan" for only
A little over a week ago we received a comment in response to David Harley’s blog post that read as follows: InterNations – the Network for Expatriates and Global Minds! The Internations Management has decided to donate 10 Eurocents to Haiti for each text message! Text "Haiti" to: +xxxxxxxxxxxx Spread the Word!