You Are Here: Home » Posts tagged "software"

Russian Hackers Promise Anti-Government Software, Deliver Kelihos Trojan Instead, Bitdefender Warns

A self-proclaimed hacker community from Russia installs data-stealing malware on users’ machines by pretending the software was designed to attack Western governments and the US, according to antivirus software company Bitdefender.  With the Ukrainian conflict in mind, hackers have crafted ingenious spam messages that help them deliver the Trojan to those who support the Russian “cause” and dislike measures...

Fans Tricked with Fake Bitdefender Antivirus Plus 2015

Bitdefender fans are not the only ones excited about the 2015 suite release in the works - scammers are also preoccupied with the new antivirus edition. They have started promoting fraudulent links on YouTube and Facebook promising the 2015 edition. The fake Bitdefender antivirus download posted on YouTube leads users to fraudulent surveys and premium SMS scams. The video had hundreds of views and several F...

Mobile Companies Told to Explain Why They Rejected Kill-Switch Software

US mobile carriers are urged to explain why they refused to implement “kill-switch” software for their devices to deter smartphone theft, according to Tech World. New York State Attorney General Eric Schneiderman has sent letters to the five largest cellphone companies, asking them to explain their refusal to implement anti-theft measures. He suggested that mobile giants could face legal action for their de...

SoundCloud Users Targeted by Scammers with Spam and Dubious Software

Users of the audio platform SoundCloud are targeted by scammers with spam and dubious software offers, according to ThreatTrack Security. Experts warn that over the last year cyber-criminals uploaded several files that misused brands of popular movies and TV shows to redirect users to spammy content.  The links embedded in the files lead to shady websites such as paid services, survey scams with fake prizes...

Five Barriers to Parent-Child Communication: Bridging Gaps with Parental Control

We humans are a rare species when it comes to parenting.  We are conflicted between excessive care and a willingness to let them loose. We are eager to be their friends, but also to set firm boundaries. We want all their problems to vanish in a blink of an eye, but we also want to prepare them to face hardships on their own. We suffer when they make mistakes, but we don’t let them see our suffering. All the...

Music Website Hacked to Dump Phishing Page and Target Sparkasse Clients

Sparkasse clients are targeted by a new phishing campaign created in German on a hacked music website. With a page resembling that of an authentic banking institution, cyber-criminals are able to steal Germans’ pins and IDs and empty their accounts. The banking details are also used for identity theft and further fraudulent schemes. The phishing attack starts with an e-mail, allegedly from Sparkasse Custome...

FBI Software Pinpoints Top Phrases Used by Corporate Fraudsters

FBI software developed with advisory firm Ernst & Young unraveled the top phrases used in email conversations among employees engaged in corporate fraud, according to a press release. The technology can also pinpoint unusual changes in tone that can reveal fraud targeting specific sectors. Some of the most common expressions used by corporate fraudsters include “cover up”, “write off”, “grey area” and “...

PC Companies Rented Out Computers, Spied on Users Having Sex

Several PC companies used computers they rented to clients to spy on people having sex, according to the Federal Trade Commission. Seven different firms secretly took such webcam pictures with software from DesignerWare, which could also track key strokes, locations, and other personal data. These included e-mail, social media, and financial credentials, Social Security numbers, medical records, private e-m...

The Spam Omelette #57

Welcome to a new issue of our Spam Omelette, the weekly review focused on the latest trends in the spam industry. Before moving forward with the material, please take a look at our testing and map generation methodology, as explained in our first issue....

© 2012 Powered By Bitdefender

x
Loading...
Scroll to top