Phone Phishing, Data Breaches, and Banking Scams
Recently, I received a rather unusual call that claimed to be from National Australia Bank (NAB), one of the four largest banks in Australia. The caller had my complete name and my address. They claimed that they had flagged a suspicious transaction from my account to an Alex Smith in New Zealand to the tune […] more…Breaking Up with Valentine’s Day Online Threats
With less than a week to go, Valentine’s Day is definitely around the corner. It has been proven that the holidays are a goldmine for cybercriminals, and there are many activities and threats online that could spoil one of the most anticipated seasons of lovers. This, after all, isn’t just time for chocolates and roses. […] more…Website Mesh Networks Distributing Malware
Can you imagine having the keys to a kingdom? How awesome would that be!! This is true in all domains, especialy when it comes to your website. This is almost like the holy grail of website attacks, gain access and do what you want with someone else’s pride and joy. We all know that once […] more…From Latin America with love, Jumcar strikes again
A new sample was submitted to the Virus Total system on January 18th which was quickly spotted by my colleague Dmitry Bestuzhev. Interestingly enough, it seems that a new variant of the Jumcar malware family has appeared and a lot of changes have been made to the original source code. As this is Latin American […] more…Changes to Gmail’s Image Display Defaults May Change Your Privacy
Recently Google announced that it had changed its policy dealing with images in email. In a blog post on the official Gmail blog, Google said: [You’ll] soon see all images displayed in your messages automatically across desktop, iOS and Android. Instead of serving images directly from their original external host servers, Gmail will now serve […] more…VBS Malware Spreading in Latin America
During the past few months, we’ve been observing increases in the number of systems infected by VBS malware, specifically VBS_SOSYOS, VBS_JENXCUS and VBS_DUNIHI. Most of these systems were found in Latin America, a region targeted by the Banker/Bancos Trojan. Figure 1. VBS malware activity for the past months in Latin America region (LAR) These VBScript […] more…Spike in Health-Themed Spam Marks September-October Spam Threats
In the past few weeks, we’ve seen drastic and noteworthy increases in the number of health-related spam in the wild. Prior to September, this type of spam was relatively rare. However, as September began, these suddenly increased. Over the next few weeks, health-themed spam constituted 30% of the spam we saw, with an average of […] more…CryptoLocker Emergence Connected to Blackhole Exploit Kit Arrest
The past few weeks have seen the ransomware CryptoLocker emerge as a significant threat for many users. Our monitoring of this threat has revealed details on how it spreads, specifically its connection to spam and ZeuS. However, it looks there is more to the emergence of this thread than initially discovered. We have identified one […] more…McAfee’s Most Dangerous Celebrities Pin It To Win It Contest: Win A Dell Ultrabook
Searching for celebrities online isn’t all glitz and glam, according to our 7th annual Most Dangerous Celebrities™ study, released earlier this week. McAfee researched which Tinseltown residents spell digital disaster when searched online. This year’s results may surprise you! Cyber criminals like to take advantage of the buzz surrounding movies, award shows, and—you guessed it—celebrities, […] more…Spam Leads to Multi-Platform Mobile Threat
Mobile threats can arrive via different methods. We have discussed at length the presence of malware in third-party app stores and even official app stores. We have also mentioned malware via text messages. We recently found one that took advantage of yet another method: spam. We encountered samples of spammed messages that were supposedly WhatsApp […] more…Ask Sucuri: Non-alphanumeric Backdoors
If you have any questions about malware, blacklisting, or security in general, send them to contact@sucuri.net and we will write a post about it and share. For all the “Ask Sucuri” answers, go here. Question: My site got hacked and I am seeing this backdoor with no alpha numeric characters. What is it doing? @$_[]=@!+_; $__=@${_}>>$_;$_[]=$__;$_[]=@_;$_[((++$__)+($__++ ))].=$_; […] more…Over 10% of Alexa TOP Million Websites Found Not Safe – Infographic Report
We scan a lot of websites per day. Through our daily work we see all sizes and types of websites compromised, blacklisted, and filled with various security issues. But, we don’t often aggregate the results to provide a public report of what we are seeing. So last month, we decided to do just that. We […] more…Where, oh Where, Does That QR Code Lead?
What is square, flat, and black and white all over? If you answered “a QR Code”, you’re correct. One of the latest trends in consumer advertising, QR codes (short for “Quick Response”) are popping up on everything from billboard advertisements to restaurant menus, business cards and cereal boxes. Some can even be viewed from Google […] more…Update Your Android OS! It Could Save You from Cyber Attacks
Although some change can be great, we’re not always thrilled when modifications are made to things we’ve become accustomed to expecting. It’s easy to get thrown off when your local supermarket relocates the produce section across the store, or when a go-to dish is removed from the menu at your favorite restaurant. And many of […] more…How Safe is Your Android Pin Code? A New Robot Can Easily Break In
By now, many smartphone users know that a first step to securing their mobile data is to lock their phones with some sort of passcode, the most common method being the four-digit PIN. Admittedly, a PIN code seems pretty safe and practically impossible for a human to break—considering the time it would take to manually […] more…Mobile Bankers Beware: A New Phishing Scam Wants Your Money
As a growing number of smartphone owners get increasingly comfortable using their mobile devices for everything from shopping online to depositing checks, cybercriminals are finding new ways to take advantage of our growing reliance on our smartphones and tablets. Savvy scammers equipped with Photoshop & some computer programming skills are looking to get your money […] more…More information
- #PrivacyAware: Will You Champion Your Family’s Online Privacy?
- Adobe Releases No ‘Patch Tuesday’ Updates
- The Pixel 6’s most important feature might be invisible
- How Hackers Bypassed an Adobe Flash Protection Mechanism
- Suckfly Hackers Target Organizations in India
- For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey
- Three of Tech’s Top CEOs to Skip Obama Cybersecurity Summit
- Facial recognition traffic camera mistakes bus for famous woman
- Plesk 0-day Remote Vulnerability in the Wild
- Epic in hot water over Steam-scraping code