Malware researchers at ESET have uncovered a widespread cybercriminal operation that has seized control of tens of thousands of Unix servers. Learn more about how to check your systems for compromise, and prevent innocent computer users from being attacked.
Our report titled “Operation Windigo – the vivisection of a large Linux server-side credential-stealing malware campaign” details our analysis of a set of malicious programs that infect servers and desktop PCs, and send nearly 500,000 web users to malicious content daily.”
If you have received an unexpected email, claiming to come from British Airways, about an upcoming flight that you haven’t booked – please be on your guard.
Online criminals are attempting to infect innocent users’ computers, by disguising their attack as an e-ticket from the airline.
Less innovative than the scam mails described in my previous articles (Phish to phry and The Thoughtful Phisher II), there are those phish messages that suggest a problem with your account that they need you to log in to fix. (Of course, you aren’t really logging in to a legitimate site.) Mostly their appeal is
YouTube comments channels are widely known as a toxic and hostile environment – but Google has admitted that YouTube’s recent integration with Google Plus has made things even worse.
[A much shorter version of this article appeared in the October 2013 Threat Radar Report as 'The Thoughtful Phisher'. As these particular scam/spam campaigns don’t seem to be diminishing, however – indeed, some of the phishing techniques seem to be getting more sophisticated – I thought perhaps it was worth updating and expanding for a
An invasion of fruity posts offering miraculous weight loss flooded Facebook and Twitter accounts linked to the social sharing app Buffer – appearing on official accounts for companies such as Brussels Airlines and Startup Genome.
Twitter has been hit by a wave of spam promising “pure garcinia cambogia” – a vegetable extract used in weight loss supplements. High-profile accounts such as Jane Fonda’s fell victim, with attackers compromising Hootsuite accounts to gain entry.
Many of us have got wiser to email spams and scams – but cybercriminals are in the perfect position to “fine tune” their attacks. Our tips might help you avoid the “click of death”…
Hit movies such as Man of Steel and World War Z have been used as bait to lure victims to spam pages on sharing site Slideshare, according to a report in The Register this week.
Google claims to have spotted and disrupted several phishing campaigns in Iran – attempts to compromise tens of thousands of email accounts in the run-up to the country’s presidential elections this Friday.
Banks should look to spam emails and their own server errors as a source of information, says Nicholas Scott of National Australia Bank (NAB), speaking at the RSA Conference Asia-Pacific in Singapore.
60,000 Android apps were removed from Google’s Play app store this February. Categories such as personalization (ringtone apps) were targeted heavily, with 12,277 deletions.
Malicious spam may still be spreading across Yahoo! Mail accounts. We show you how to turn on the added verification process that Yahoo! offers.
Malware infecting 25,000 computers, mostly in the United States, pumping out 80 million spam messages per hour? ESET researchers sinkhole to investigate Win32/TrojanDownloader.Zortob.B
Issues with malware are always with us. There may or may not be a current media storm, or companies hoping for a slice of the anti-malware pie by proclaiming the death of antivirus in a press release, but AV labs continue to slog their way every day through tens of thousands of potentially malicious samples.
The UK Information Commissioner’s Office (ICO) fined two owners of a marketing company £440,000 ($713,000) for bombarding the public with millions of unlawful spam texts over a period of three years. It’s the first time that the ICO has used its power to issue a monetary penalty for a serious breach of the UK Privacy