Scams


428 articles

Email malware: blast from the past

Email malware: blast from the past

Email malware: blast from the past

...today I'm waxing nostalgic about a piece of malware. Not one of those anniversaries that have filled so many blogs, articles and videos recently (happy birthday, dear Brai-ain....), but something that just popped into my mailbox...

David Harley08 Mar 2011


Phone Scams and Panic Attacks

Phone Scams and Panic Attacks

Phone Scams and Panic Attacks

...many scams work by panicking victims into taking some unwise action, whether it's parting with their credit card details or opening a malicious program, claiming that some problem or illegal action is associated with their computer or IP address, such as transmitting malware or visiting paedophile or other pornographic sites...

David Harley20 Jan 2011


How to Fool a Security Researcher

How to Fool a Security Researcher

How to Fool a Security Researcher

...Andrew Lee conducted a fun but disquieting thought experiment in the course of an amusing and informative presentation on user education at the recent Virus Bulletin Seminar...

David Harley08 Dec 2010


Stealing from Santa (Scammers' Holiday Season)

Stealing from Santa (Scammers' Holiday Season)

Stealing from Santa (Scammers' Holiday Season)

My colleague Urban Schrott, from ESET Ireland, wrote a nice feature article for our monthly ThreatSense report (which should be available shortly on the Threat Center page at http://www.eset.com/threat-center) on seasonal scams. As the scam season is starting to get into full swing, we thought it might be good to give it a wider audience here.

David Harley02 Dec 2010


IM to Spread Malware: the Butterfly Effect

IM to Spread Malware: the Butterfly Effect

IM to Spread Malware: the Butterfly Effect

Pierre-Marc Bureau16 Nov 2010


Boonana Threat Analysis

Boonana Threat Analysis

Boonana Threat Analysis

David Harley31 Oct 2010


Scam of the Day AKA She Loves You Yeah, Yeah, Yeah

Scam of the Day AKA She Loves You Yeah, Yeah, Yeah

Scam of the Day AKA She Loves You Yeah, Yeah, Yeah

ESET Research20 Oct 2010


Imitation is not always the sincerest form of flattery

Imitation is not always the sincerest form of flattery

Imitation is not always the sincerest form of flattery

ESET Research07 Oct 2010


Privacy? Who Cares?

Privacy? Who Cares?

Privacy? Who Cares?

In the security industry, we're sometimes over-ready to be over-prescriptive, seeing security and privacy concerns as paramount where others see them as a distraction. And we've become used to the mindset that computer users will always prefer convenience to security.

David Harley20 Sep 2010