Posted on: May 13th, 2013
With the advent of the internet, it has become so much easier for scam artists and con men to reach into the wallets and accounts of good hearted people world-wide. Of course, scams that use a real-life tragedy as a means to do so are nothing new. The 9/11 attacks, the Indonesian Tsunami, the Japanese earthquake and subsequent Tsunami and now even the bombings at the Boston Marathon.
The recent news of these tragedies, together with the scam artists’ promise via email or online links to deliver some new video, pictures or whatever they promise means it is more likely that people who want to help will click that link or open that email. Read the rest of this entry »
Posted on: May 12th, 2013
Krebs is reporting from North Carolina that Park Sterling bank is immediately suing its customers Wallace & Pittman, which is a law firm and is demanding to return all the funds bank has provided them in order to recover funds that were stolen by hackers.
The hackers have committed this deceitful wire transfer for an amount of $336,000 from the bank account of the company by giving exact details such as username, password, Pin code and even security questions. The bank straight away transferred the funds to a bank in New York, before the funds were moved to a bank in Moscow. Read the rest of this entry »
Posted on: May 11th, 2013
The issue of cyber security is one which keeps changing constantly as hackers and cyber criminals keep coming up with new ways to compromise systems to new vulnerabilities as the old ones keep getting discovered and patched. As a result, cyber security has always been a cat and mouse game in between cyber criminals and users. There are a two security threats which have recently been discovered and all security professionals must know about them. Read the rest of this entry »
Posted on: May 10th, 2013
The outskirts of Shanghai contains an office that is serving as a base room for People’s liberation Army base for China’s increasing number of people as cyber warriors. A detailed forensic report clears that the American intelligence officials have been taped into this activity of army unit for years and it leaves a rare chance that the American organizations, agencies and corporations have been attacked by this white tower.
A recent report clears that for the first time an American security firm confirms that a hacking group in China is attacking United States in known as Shanghai group. The firm haven’t given a clear idea on the fact that these attacks have been originated from this white building, but there is no explanation that why there are so many attacks from such a small area? Read the rest of this entry »
Posted on: May 9th, 2013
It had been widely projected by numerous industry experts such as Eugene Kaspersky that creating cloud based security technologies could make the business of creating malware extremely unprofitable. However, the question that remains to be answered is whether these technologies have lived up to their billing. The answer to this question is that while these technologies haven’t put cyber criminals out of business, it certainly has proved to be a formidable ally for industries and organizations in the struggle against cyber crime. Most anti virus programs nowadays also use these cloud based security systems of offer enhanced security for their users. Read the rest of this entry »
Posted on: May 8th, 2013
Today’s cyber criminals, in addition to being heartless enough to take advantage of a tragic situation like the Boston Marathon bombings are sneaky and often redirect internet searchers to a malicious site. This Friday there was an issue with the connection between Microsoft’s Bing.com website and those attempting to connect via a secure HTTPS connection. Google Chrome users attempting to connect to Bing.com received this message: Read the rest of this entry »