Blog

Social engineering

  • 1
    Share
 October 31, 2012

Estimated reading time: 1 minute

A series of new spam emails that target computer users and attempt to infect them with a variant of a ZBOT trojan have been discovered. The e-mail attempts to persuade a recipient to open an attachment and claims that the said attachment contains a payment confirmation for the recipient. However,...
 October 30, 2012

Estimated reading time: 2 minutes

Hurricane Sandy is one of the biggest storms to ever hit the East coast of the United States in years. Cyber criminals are duly taking advantage of the massive number of people who are keenly following the related news updates. It is a sad state of affairs that such events...
 October 27, 2012

Estimated reading time: 3 minutes

Cyber criminals and malicious scammers are constantly at work to devise new ways to steal confidential user data. Unfortunately, such attacks are not just restricted to the Internet. A recently discovered spate of attacks enables scammers to steal credit/debit card details and these methods are increasingly carried out in the...
 October 18, 2012

Estimated reading time: 1 minute

Another email scam that uses the name and logo of the Better Business Bureau (BBB) has continued to spread over the Internet. A majority of such emails carry the recognisable BBB torch logo and contain the subject line “Case #91492169”. These emails carry an attachment that contains a malicious executable file...
 October 16, 2012

Estimated reading time: 2 minutes

Fraudsters have gone one step ahead and started circulating e-mails that resemble the Reserve Bank of India’s (RBI) official letters. These emails appear to come from Mr. D. Subbarao, the Governor of RBI. Such con letters appear to come from the Funds Remittance Department of RBI and they tell the...
 October 11, 2012

Estimated reading time: 2 minutes

A new malicious worm that spreads through Instant Messages (IMs) over Skype has been discovered. This worm manifests itself as yet another variation of ransomware and also unloads itself to generate a click fraud from the users’ machine. The worm is a strain of the Dorkbot virus and it utilizes...
 October 10, 2012

Estimated reading time: 2 minutes

Getting less tech-savvy family members, especially teenagers and younger children, interested in computer security is a thankless task. It is necessary to teach them the implications of security breaches along with the importance of preventive measures. Children and young adults are more vulnerable to security risks like viruses, phishing websites...
 August 1, 2012

Estimated reading time: 2 minutes

A new Facebook scam has been spotted over the last few days. Unlike previously seen social engineering tricks, this scam only appears after a certain malware enters a system. The malware, known as Citadel, injects itself into a Facebook session when a victim opens a Facebook webpage. It then displays...
 July 27, 2012

Estimated reading time: 2 minutes

Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky apps over the Android Market (Google Play). But researchers have now discovered a way to convert good apps into malicious ones via an update, after they have been installed on a device....
 July 26, 2012

Estimated reading time: 2 minutes

Phishing, an attempt to steal banking details, is a serious problem faced by banks worldwide. Commonly, a phishing attempt appears as an e-mail that comes from a known institution like a bank or a popular online shopping website. I recently came across such an email which pretends to be from...