Job scams are a permanent fixture in cyberspace. Anyone who has posted their resume online has offered cyber gangs two crucial pieces of information – one, a way to contact them, and two, the fact they’re in need of a job.
Twitter was flooded by an avalanche of spam from compromised accounts, leading to shortened links and pages promising miracle weight loss, diet pills, and products which would “change lives”. The attack appeared to have come via a third-party service connected to Twitter.
Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”
If you have received an unexpected email, claiming to come from British Airways, about an upcoming flight that you haven’t booked – please be on your guard.
Online criminals are attempting to infect innocent users’ computers, by disguising their attack as an e-ticket from the airline.
Less innovative than the scam mails described in my previous articles (Phish to phry and The Thoughtful Phisher II), there are those phish messages that suggest a problem with your account that they need you to log in to fix. (Of course, you aren’t really logging in to a legitimate site.) Mostly their appeal is
YouTube comments channels are widely known as a toxic and hostile environment – but Google has admitted that YouTube’s recent integration with Google Plus has made things even worse.
[A much shorter version of this article appeared in the October 2013 Threat Radar Report as 'The Thoughtful Phisher'. As these particular scam/spam campaigns don’t seem to be diminishing, however – indeed, some of the phishing techniques seem to be getting more sophisticated – I thought perhaps it was worth updating and expanding for a
An invasion of fruity posts offering miraculous weight loss flooded Facebook and Twitter accounts linked to the social sharing app Buffer – appearing on official accounts for companies such as Brussels Airlines and Startup Genome.
Twitter has been hit by a wave of spam promising “pure garcinia cambogia” – a vegetable extract used in weight loss supplements. High-profile accounts such as Jane Fonda’s fell victim, with attackers compromising Hootsuite accounts to gain entry.
Many of us have got wiser to email spams and scams – but cybercriminals are in the perfect position to “fine tune” their attacks. Our tips might help you avoid the “click of death”…
Hit movies such as Man of Steel and World War Z have been used as bait to lure victims to spam pages on sharing site Slideshare, according to a report in The Register this week.
Google claims to have spotted and disrupted several phishing campaigns in Iran – attempts to compromise tens of thousands of email accounts in the run-up to the country’s presidential elections this Friday.
Banks should look to spam emails and their own server errors as a source of information, says Nicholas Scott of National Australia Bank (NAB), speaking at the RSA Conference Asia-Pacific in Singapore.
El modelamiento del comportamiento de las amenazas informáticas puede ser de gran ayuda para entenderlas y por lo tanto combatirlas. Veamos en este post algunos conceptos que se pueden tener en cuenta para este tipo de modelos. Los botmaster, cibercriminales detrás de una botnet, utilizan una amplia gama de vectores para lograr tener acceso a
60,000 Android apps were removed from Google’s Play app store this February. Categories such as personalization (ringtone apps) were targeted heavily, with 12,277 deletions.