Ransomware: Trojan asks to reactivate Windows

Posted by cyber-geek | Posted in Be Informed on Cyber Security | Posted on 06-05-2011

0

A new mutation of ransomware, which asks for reactivation of Windows, has been reported by F-secure. The user gets a blue screen, saying that the Windows license has been locked. The message screen exactly looks like the Windows screen during installation of OS. There is even a Windows logo on the top-right corner of the screen, to make the message look authentic.

Email Spam Volumes Fall to Lowest Level in Two Years: Symantec

Posted by cyber-geek | Posted in Be Informed on Cyber Security | Posted on 03-02-2011

0

A recent report from Symantec declared that spam volumes in January 2011 fell to the lowest levels, since March 2009. The spam volumes seemed to drop dramatically since 25th December of 2010 and continued its phase in January. The only time that spam volumes dropped by such a remarkable extent was after the closure of McColo, a California-based ISP in 2008, for being implicated in criminal and botnet… Continue reading

Malware Lurks Within Pirated Versions of Popular Movie Downloads

Posted by cyber-geek | Posted in Secure Downloading | Posted on 11-12-2009

0

Now-a-days cyber criminals are using popular events, current developments and even movie premieres to attract people who seek free or pirated content and exploiting.

A recent online scam which promises viewers to download the recent “Twilight – New Moon” movie is found to install malware in PCs.

The entire process of this scam is as follows…

  • Viewers are lured

Social Responses to Prevent Phishing

Posted by cyber-geek | Posted in Secure Downloading, Spam Awareness | Posted on 27-10-2009

0

One technique used to combat phishing is training people to recognize phishing attempts, and exposing them to the know-how of dealing with them. Education can be effective since training provides a direct feedback. Spear phishing, a form of phishing targeted at a specific company, was harnessed to train individuals at various locations that included the United States Military Academy at West Point, NY. In a spear phishing experiment… Continue reading

Phishing – Types And Precautions

Posted by cyber-geek | Posted in Cyber tips, Secure Downloading, Spam Awareness | Posted on 10-09-2009

3

The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication is known as Phishing.

Types of Phishing
Phishing is usually carried out by email or instant messaging and it often directs users to enter details at a fake website, which is similar to the legitimate one… Continue reading

Most Dangerous Celebrities in Indian Cyberspace

Posted by cyber-geek | Posted in Secure Downloading, Spam Awareness | Posted on 09-09-2009

0

McAfee says that searching for Yuvraj and Aishwarya in the cyberspace can damage one’s PC. The research from McAfee on India’s glamorous celebrities from the world of cinema, cricket and politics to reveal the most risky celebrities on the web, has rated Yuvraj and Aishwarya on top.

Fans searching for ‘Yuvaraj Singh wallpapers’, ‘Yuvraj Singh downloads’, ‘Yuvraj

New Malicious Web Links Increase By 508%: says IBM

Posted by cyber-geek | Posted in Spam Awareness | Posted on 29-08-2009

1

IBM’s X-Force 2009 Mid-Year Trend and Risk Report says that there has been a tremendous increase of 508% in malicious web links over Internet during first half of 2009. The malicious content was found even on trusted sites, including search engines, blogs, bulletin boards, personal websites, online magazines and mainstream news sites.