Recent reports have indicated that the actors behind Dridex, originally a banking Trojan distributor, have switched tactics, and are now heavily pushing out a new ransomware called Locky.
The current method of distribution is via a spam email, which contains a Word document. Additional reports have stated that it is being distributed via the Neutrino Exploit Kit.
Note, the file name may be different for every email sent, but the file will always be a Word document.
If you open the email, you’ll see an alert by Word, which warns you that the document contains a macro. Macros allow users to “code” specific procedures into the document, to help automate or repeat specific tasks.
Form is loading...
This is an update to a previous alert sent from Action Fraud in November 2015.
Fraudsters are setting up high specification websites advertising various electrical goods and domestic appliances. These goods are below market value and do not exist. The website will state you can pay via card; however when the purchaser goes to pay, this option is not available and the payment must be made via bank transfer.
The fraudster entices the purchaser and reassures them it is a legitimate purchase by using the widely recognised Trusted Shop Trustmark. They then use the Trustmark fraudulently and provide a link on the bogus electrical website to another bogus website (which purports to be Trusted Shops). This website shows a fake certificate purporting to be from Trusted Shops and provides thousands of reviews for the bogus electrical website. These reviews are all fraudulent. The website has not been certified by Trusted Shops and therefore the purchaser is not covered by the Trusted Shop money-back guarantee.
Protect yourself:
If you, or anyone you know, have been affected by this fraud or any other scam, report it to Action Fraud by calling 0300 123 2040 or visiting www.actionfraud.police.uk.
You must be logged in to see the comments. Log in now!
If you have no account yet, you can register now...
(It only takes a few seconds!)
Form is loading...
Most households now run networks of devices linked to the Internet, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access wireless networks. To protect your home network and your family, you need to have the right tools in place and confidence that family members can use the Internet safely and securely.
The first step is to Keep a Clean Machine and make sure all of your Internet-enabled devices have the latest operating system, web browsers and security software. This includes mobile devices that access your wireless network.
A wireless network means connecting an Internet access point – such as a cable or DSL modem – to a wireless router. Going wireless is a convenient way to allow multiple devices to connect to the Internet from different areas of your home. However, unless you secure your router, you’re vulnerable to people accessing information on your computer, using your Internet service for free and potentially using your network to commit cybercrimes.
Here are ways to secure your wireless router:
Protect Yourself with these STOP. THINK. CONNECT. Tips:
- See more at: https://staysafeonline.org/stay-safe-online/keep-a-clean-machine/securing-your-home-network#sthash.RKYdrfKz.dpuf
You must be logged in to see the comments. Log in now!
If you have no account yet, you can register now...
(It only takes a few seconds!)
Form is loading...
Fending off malware is more than a full-time job. Those who work in cybersecurity have their hands full patching vulnerabilities, cleaning infected machines, gathering threat intelligence, or training users on best practices. So having to worry about PUPs on top of it all can probably feel overwhelming—or at the very least a little annoying.
That’s why we’ve come up with a PUPs cheat sheet that businesses can use to train IT staff and users. A little PUPs awareness, if you will. Read on to learn more about how you get PUPs, what they do to your computer, and how you can avoid them.
You must be logged in to see the comments. Log in now!
If you have no account yet, you can register now...
(It only takes a few seconds!)
Form is loading...
By Mark Patton
Today, malware is everywhere. Spreading across the web, infecting desktops, mobile, and tablets – it’s the modern, cyber equivalent of the plague.
So how did we arrive at this place? A place where it’s estimated that, in 2015 alone, close to half a billion types of malware have been identified – that’s 1.4 million types each day and seven million a week – staggering numbers when put into perspective.
Much of this malware is designed and distributed through a complex ecosystem of organised crime, out to attack innocent victims and profit from ordinary people’s lack of knowledge of how to protect themselves online.
Well, to understand the present, you have to understand the past.
You must be logged in to see the comments. Log in now!
If you have no account yet, you can register now...
(It only takes a few seconds!)
Form is loading...
You must be logged in to see the comments. Log in now!
If you have no account yet, you can register now...
(It only takes a few seconds!)