A new mutation of ransomware, which asks for reactivation of Windows, has been reported by F-secure. The user gets a blue screen, saying that the Windows license has been locked. The message screen exactly looks like the Windows screen during installation of OS. There is even a Windows logo on the top-right corner of the screen, to make the message look authentic.
A recent report from Symantec declared that spam volumes in January 2011 fell to the lowest levels, since March 2009. The spam volumes seemed to drop dramatically since 25th December of 2010 and continued its phase in January. The only time that spam volumes dropped by such a remarkable extent was after the closure of McColo, a California-based ISP in 2008, for being implicated in criminal and botnet… Continue reading
Posted by cyber-geek | Posted in Secure Downloading | Posted on 11-12-2009
Now-a-days cyber criminals are using popular events, current developments and even movie premieres to attract people who seek free or pirated content and exploiting.
A recent online scam which promises viewers to download the recent “Twilight – New Moon” movie is found to install malware in PCs.
The entire process of this scam is as follows…
One technique used to combat phishing is training people to recognize phishing attempts, and exposing them to the know-how of dealing with them. Education can be effective since training provides a direct feedback. Spear phishing, a form of phishing targeted at a specific company, was harnessed to train individuals at various locations that included the United States Military Academy at West Point, NY. In a spear phishing experiment… Continue reading
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication is known as Phishing.
Types of Phishing
Phishing is usually carried out by email or instant messaging and it often directs users to enter details at a fake website, which is similar to the legitimate one… Continue reading
McAfee says that searching for Yuvraj and Aishwarya in the cyberspace can damage one’s PC. The research from McAfee on India’s glamorous celebrities from the world of cinema, cricket and politics to reveal the most risky celebrities on the web, has rated Yuvraj and Aishwarya on top.
Fans searching for ‘Yuvaraj Singh wallpapers’, ‘Yuvraj Singh downloads’, ‘Yuvraj
Posted by cyber-geek | Posted in Spam Awareness | Posted on 29-08-2009
IBM’s X-Force 2009 Mid-Year Trend and Risk Report says that there has been a tremendous increase of 508% in malicious web links over Internet during first half of 2009. The malicious content was found even on trusted sites, including search engines, blogs, bulletin boards, personal websites, online magazines and mainstream news sites.