tag
SPAM

Wɑit! Stοp! Is that ℓιηκ what it claims to be?

Can you tell the difference between exɑmple and example?

Google adds non-Latin support to Gmail, and we explain why characters matter when it comes to protecting yourself from spam, phishing and other attacks.

Pinterest hit by weight loss spam

Picture-sharing social media site Pinterest appears to have been hacked, as multiple users reported weight-loss spam messages both on Pinterest itself and on Twitter.

The perfect job? Dream on! Five signs a job offer is a scam

Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information – one, a way to contact them, and two, the fact they’re in need of a job.

Twitter awash in miracle diet pills spam onslaught

Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives”. The attack appeared to have come via a third-party service connected to Twitter.

AOL diet spam email assaults world

A flood of diet spam emails seemingly from AOL addresses has hit inboxes around the worl

Over 500,000 PCs attacked every day after 25,000 UNIX servers hijacked by Operation Windigo

Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.

Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign

Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”

British Airways e-ticket malware attack launched via email

If you have received an unexpected email, claiming to come from British Airways, about an upcoming flight that you haven’t booked – please be on your guard.

Online criminals are attempting to infect innocent users’ computers, by disguising their attack as an e-ticket from the airline.

The Less Thoughtful Phisher

Less innovative than the scam mails described in my previous articles (Phish to phry  and The Thoughtful Phisher II), there are those phish messages that suggest a problem with your account that they need you to log in to fix. (Of course, you aren’t really logging in to a legitimate site.) Mostly their appeal is

YouTube comment channels now even angrier after ‘forced marriage’ to Google Plus

YouTube comments channels are widely known as a toxic and hostile environment – but Google has admitted that YouTube’s recent integration with Google Plus has made things even worse.

Phish to phry: The Thoughtful Phisher Revisited…

[A much shorter version of this article appeared in the October 2013 Threat Radar Report as 'The Thoughtful Phisher'. As these particular scam/spam campaigns don’t seem to be diminishing, however – indeed, some of the phishing techniques seem to be getting more sophisticated – I thought perhaps it was worth updating and expanding for a

Rebuffed! Social site Buffer fights off onslaught of fruity weight-loss spam

An invasion of fruity posts offering miraculous weight loss flooded Facebook and Twitter accounts linked to the social sharing app Buffer – appearing on official accounts for companies such as Brussels Airlines and Startup Genome.

Twitter faces fruit invasion as weight-loss spammers invade via Hootsuite

Twitter has been hit by a wave of spam promising “pure garcinia cambogia” – a vegetable extract used in weight loss supplements. High-profile accounts such as Jane Fonda’s fell victim, with attackers compromising Hootsuite accounts to gain entry.

Bulletproof Inbox: Tips for staying safe (and sane) on email

Many of us have got wiser to email spams and scams – but cybercriminals are in the perfect position to “fine tune” their attacks. Our tips might help you avoid the “click of death”…

Instagram hit by fruity spam attack

Instagram users were bombarded with pictures of fruit over the weekend in a spam attack that swept the photo-sharing network.

Man of Steel movie streams used as bait for Slideshare spam pages

Hit movies such as Man of Steel and World War Z have been used as bait to lure victims to spam pages on sharing site Slideshare, according to a report in The Register this week.

Iranian election phishing campaigns thwarted by Google

Google claims to have spotted and disrupted several phishing campaigns in Iran – attempts to compromise tens of thousands of email accounts in the run-up to the country’s presidential elections this Friday.

Banks “ignore early warnings” of cyber attacks, says Australian security chief

Banks should look to spam emails and their own server errors as a source of information, says Nicholas Scott of National Australia Bank (NAB), speaking at the RSA Conference Asia-Pacific in Singapore.

Modelado del comportamiento de una botnet

El modelamiento del comportamiento de las amenazas informáticas puede ser de gran ayuda para entenderlas y por lo tanto combatirlas. Veamos en este post algunos conceptos que se pueden tener en cuenta para este tipo de modelos. Los botmaster, cibercriminales detrás de una botnet, utilizan una amplia gama de vectores para lograr tener acceso a

Android app store has serious clean-up with 60,000 apps removed

60,000 Android apps were removed from Google’s Play app store this February. Categories such as personalization (ringtone apps) were targeted heavily, with 12,277 deletions.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
13 Aug 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.