Microsoft Patch Tuesday – December 2013
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing eleven bulletins covering a total of 24 vulnerabilities. Ten of this month's issues are rated...
View ArticleSpammers Leverage Binary Options Trading Hype
The latest trend in Russian language spam shows that spammers have started promoting Make Money Fast (MMF) schemes where users are told that money can be easily made with the use of binary options...
View ArticleFrom the Early Lark to the Tardy Owl, Spammers Intend Catering to All This...
Contributor: Binny Kuriakose ‘Hello world’ we are digital! Well that was ages ago. Today the need for speed has made us extra fast. A click of a button and the desired webpage is up and running in an...
View ArticleInstagram Hoax: Over 100,000 Users Repost Bogus Account Deletion Message
Over the weekend, a hoax about mass account deletion made its rounds on photo-sharing app Instagram. A bogus account @activeaccountsafe, posted a photo which claimed to be a privacy policy update from...
View ArticleMassive Malvertising Campaign Leads to Browser-Locking Ransomware
The Browlock ransomware (Trojan.Ransomlock.AG) is probably the simplest version of ransomware that is currently active. It does not download child abuse material, such as Ransomlock.AE, or encrypt...
View ArticleThe State of Financial Trojans in 2013
“Because that’s where the money is!” This is a quote frequently attributed to Willie Sutton as the answer he allegedly gave when asked why he robbed banks. Even though Mr. Sutton never gave this...
View ArticlePlease Leave Your Hat On
Recently, we wrote about creepware and how people use it to spy on unsuspecting victims through webcams. As the name implies, this is really creepy. Unfortunately, there are other similar threats on...
View ArticleAndroid Tapsnake Mobile Scareware: Ads Push Antivirus
Recently we have observed a series of mobile ads intended to scare users into believing that their device is infected with a threat called “Trojan: MobileOS/Tapsnake”. Figure 1. Fake Tapsnake infection...
View ArticleFake Browser Update Site Installs Malware
In the first week of 2014, we came across a website using tried and tested social engineering techniques to coerce victims into installing malware. The domain http://newyear[REMOVED]fix.com, was...
View ArticleNew Year, New Apartment, Same Old Scams
The New Year has started and many people are still holding to their resolutions. Besides the usual suspects of exercising more and quitting smoking, some might have planned on finding a new apartment....
View ArticleManga Scanlation Services, a Viable Target for Malicious Activities
Japanese animation is known as anime and Japanese comics are known as Manga. In the last two decades, these industries have grown in popularity across the world. People know that cashing in on the...
View ArticleAttacks Against the Energy Sector
Energy is crucial to our modern lifestyle. Disturbingly, reports of attempted attacks against the companies and industries that supply it are increasing every year. In the first half of 2013, the...
View ArticlePopular Japanese Publisher’s Website led to Gongda Exploit Kit
We recently encountered a website of a major Japanese book publisher and distributor, of books, magazines, comics, movies, and games, injected with a malicious iframe leading to another website hosting...
View ArticleMicrosoft Patch Tuesday – January 2014
Hello, welcome to this month's blog on the Microsoft patch release. This month the vendor is releasing four bulletins covering a total of six vulnerabilities. All six of this month's issues are rated...
View ArticleRest in Peace Scams
The rise of “rest in peace” scam messages on social media sites continues. Jackie Chan, Morgan Freeman, Will Smith, Keanu Reeves, and Rihanna are only a few of the celebrities that have been proclaimed...
View ArticleScammers Exploit Vacation Hangover with Malware Attacks
It’s not surprising to see scammers exploiting the laxity of Internet users.Symantec has observed another malware wave over the past few days following the holiday season. Many users check their...
View Article.Zip Attachment Spam Makes a Grand Return
After a long hiatus, spammers are once again using an old trick, where they attach a .zip file to trick the user into executing the compressed malware. The chart below shows the number of spam messages...
View ArticleSnapchat Spam: Sexy Photos Lead to Compromised Branded Short Domains
A few weeks after our blog post about porn and secret admirer spam targeting Snapchat users, a new spam campaign using sexually suggestive photos and compromised custom URLs is circulating on the photo...
View ArticleCase Study from the Spammer's Perspective: Crafting Spam Content to Increase...
Spammer success is dependent on two factors:Evading spam filters so the spam message arrives in the recipient inboxCrafting messages so that the recipient is enticed to open and perform desired...
View ArticleThe Internet of Things: New Threats Emerge in a Connected World
Could your baby monitor be used to spy on you? Is your television keeping tabs on your viewing habits? Is it possible for your car to be hacked by malicious attackers? Or could a perfectly innocent...
View Article