29/02/16

  05:21:00 pm by Admin, Categories: News, Security, Virus - Ransomware - Spyware

Recent reports have indicated that the actors behind Dridex, originally a banking Trojan distributor, have switched tactics, and are now heavily pushing out a new ransomware called Locky.

The current method of distribution is via a spam email, which contains a Word document. Additional reports have stated that it is being distributed via the Neutrino Exploit Kit.

dodi

Note, the file name may be different for every email sent, but the file will always be a Word document.

If you open the email, you’ll see an alert by Word, which warns you that the document contains a macro. Macros allow users to “code” specific procedures into the document, to help automate or repeat specific tasks.

Full story »

 Permalink

You must be logged in to see the comments. Log in now!

If you have no account yet, you can register now...
(It only takes a few seconds!)


Form is loading...

19/02/16

  08:40:00 pm by Admin, Categories: News, Security

This is an update to a previous alert sent from Action Fraud in November 2015.

Fraudsters are setting up high specification websites advertising various electrical goods and domestic appliances. These goods are below market value and do not exist. The website will state you can pay via card; however when the purchaser goes to pay, this option is not available and the payment must be made via bank transfer.

The fraudster entices the purchaser and reassures them it is a legitimate purchase by using the widely recognised Trusted Shop Trustmark. They then use the Trustmark fraudulently and provide a link on the bogus electrical website to another bogus website (which purports to be Trusted Shops). This website shows a fake certificate purporting to be from Trusted Shops and provides thousands of reviews for the bogus electrical website. These reviews are all fraudulent. The website has not been certified by Trusted Shops and therefore the purchaser is not covered by the Trusted Shop money-back guarantee.

Protect yourself:

  • Check the authenticity of the website before making any purchases. Conduct a ‘Whois’ search on the website which will identify when the website has been created- Be wary of newly formed domains. You can conduct this search using the following website – https://who.is/
  • Conduct online research in relation to the website, company name and the business address provided to identify any poor feedback or possible irregularities.
  • Check the Trusted Shops Facebook page where warnings about websites using their Trustmark are published. If you are in doubt about the legitimacy of a Trustmark then you can contact Trusted Shops on 0203 364 5906 or by email service@trustedshops.co.uk. They will confirm whether they have certified that website.
  • Payments made via bank transfer are not protected should you not receive the item. Therefore always try to make the payment via PayPal or a credit card where you have some payment cover should you not receive your product.
  • If the item advertised seems too good to be true, then it probably is.  


If you, or anyone you know, have been affected by this fraud or any other scam, report it to Action Fraud by calling 0300 123 2040 or visiting www.actionfraud.police.uk.

You must be logged in to see the comments. Log in now!

If you have no account yet, you can register now...
(It only takes a few seconds!)


Form is loading...

17/02/16

  03:49:00 pm by Admin, Categories: Security

A protected home network means your family can use the Internet safely and securely.

Most households now run networks of devices linked to the Internet, including computers, laptops, gaming devices, TVs, tablets, and smartphones that access wireless networks. To protect your home network and your family, you need to have the right tools in place and confidence that family members can use the Internet safely and securely.

The first step is to Keep a Clean Machine and make sure all of your Internet-enabled devices have the latest operating system, web browsers and security software. This includes mobile devices that access your wireless network.

Secure Your Wireless Router

A wireless network means connecting an Internet access point – such as a cable or DSL modem – to a wireless router. Going wireless is a convenient way to allow multiple devices to connect to the Internet from different areas of your home. However, unless you secure your router, you’re vulnerable to people accessing information on your computer, using your Internet service for free and potentially using your network to commit cybercrimes.

Here are ways to secure your wireless router:

  • Change the name of your router: The default ID - called a service set identifier” (SSID) or “extended service set identifier” (ESSID ) – is assigned by the manufacturer. Change your router to a name that is unique to you and won’t be easily guessed by others.
  • Change the pre-set password on your router: When creating a new password, make sure it is long and strong, using a mix of numbers, letters and symbols.
  • Review security options: When choosing your router’s level of security, opt for WPA2, if available, or WPA. They are more secure than the WEP option.
  • Create a guest password: Some routers allow for guests to use the network via a separate password.  If you have many visitors to your home, it’s a good idea to set up a guest network.
  • Use a firewall: Firewalls help keep hackers from using your computer to send out your personal information without your permission. While anti-virus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don't permit. Your operating system and/or security software likely comes with a pre-installed firewall, but make sure you turn on these features.


Protect Yourself with these STOP. THINK. CONNECT. Tips:

  • Keep a clean machine: Having the latest security software, web browser, and operating system are the best defenses against viruses, malware, and other online threats.
  • Automate software updates: Many software programs will automatically connect and update to defend against known risks. Turn on automatic updates if that’s an available option.
  • Protect all devices that connect to the Internet: Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from viruses and malware.
  • Plug & scan: “USBs” and other external devices can be infected by viruses and malware. Use your security software to scan them.
  • Protect your ££: When banking and shopping, check to be sure the sites is security enabled. Look for web addresses with “https://” or “shttp://”, which means the site takes extra measures to help secure your information. “Http://” is not secure.
  • Back it up: Protect your valuable work, music, photos, and other digital information by making an electronic copy and storing it safely.

- See more at: https://staysafeonline.org/stay-safe-online/keep-a-clean-machine/securing-your-home-network#sthash.RKYdrfKz.dpuf

You must be logged in to see the comments. Log in now!

If you have no account yet, you can register now...
(It only takes a few seconds!)


Form is loading...

15/02/16

  02:13:00 pm by Admin, Categories: Security, Virus - Ransomware - Spyware

BY MALWAREBYTES LABS

Fending off malware is more than a full-time job. Those who work in cybersecurity have their hands full patching vulnerabilities, cleaning infected machines, gathering threat intelligence, or training users on best practices. So having to worry about PUPs on top of it all can probably feel overwhelming—or at the very least a little annoying.

 That’s why we’ve come up with a PUPs cheat sheet that businesses can use to train IT staff and users. A little PUPs awareness, if you will. Read on to learn more about how you get PUPs, what they do to your computer, and how you can avoid them.

Full story »

You must be logged in to see the comments. Log in now!

If you have no account yet, you can register now...
(It only takes a few seconds!)


Form is loading...

14/02/16

  05:16:00 pm by Admin, Categories: News, Security, Virus - Ransomware - Spyware

By Mark Patton

Malware: Understanding the enemy

Today, malware is everywhere. Spreading across the web, infecting desktops, mobile, and tablets – it’s the modern, cyber equivalent of the plague.

So how did we arrive at this place? A place where it’s estimated that, in 2015 alone, close to half a billion types of malware have been identified – that’s 1.4 million types each day and seven million a week – staggering numbers when put into perspective.

Much of this malware is designed and distributed through a complex ecosystem of organised crime, out to attack innocent victims and profit from ordinary people’s lack of knowledge of how to protect themselves online.

Well, to understand the present, you have to understand the past.

Full story »

You must be logged in to see the comments. Log in now!

If you have no account yet, you can register now...
(It only takes a few seconds!)


Form is loading...

::