Blog Posts Tagged with "Scareware"
June 13, 2012 Added by:Headlines
While the objective of criminal elements largely remains the same, the ubiquity of the digital systems that pervade every aspect of our culture present a new set of challenges for law enforcement, and new breed of criminal. The following are the Federal Bureau of Investigations "most wanted" cyber crooks...
May 08, 2012 Added by:Headlines
While some of the myths addressed may seem to be common sense issues, they also represent widespread misconceptions that continue to be pervasive in the information technology world today, so a reminder that these notions are bunk seems in order...
March 26, 2012 Added by:Scot Terban
What is worrying is that the scanner online at amihackerproof.com has no restrictions on it as to who it may scan, just put in an IP or domain name and click to hit some systems using this site. That’s right Mark Zuckerberg, you now can see if facebook.com is easily pwn-able...
March 08, 2012 Added by:Rafal Los
Bad guys often rely on the end-user's lack of awareness, employing some dirty tricks like creating a convincing web page that looks just like your antivirus software, or something equally dastardly. But there's another trick that makes me crazy: End User License Agreements...
January 13, 2012 Added by:Anthony M. Freed
Update: “The Lords of Dharmaraja” claim to have released the source code for Symantec's Norton Utilities as was threatened earlier today. The alleged data dump has not been confirmed, and company officials have not yet released a statement. Exclusive interview with YamaTough here...
November 28, 2011 Added by:Robert Siciliano
Whether you like it or not, the Christmas machine arrived well before Thanksgiving — at least as far as stores and advertisers are concerned. And there’s no question that scammers, identity thieves, and criminal hackers have already begun setting traps for holiday shoppers...
August 16, 2011 Added by:Robert Siciliano
The growing popularity of Apple products has inspired cybercriminals to create viruses that will harm Macs. Until now, Macs have been immune to these threats, but McAfee Labs is seeing the very first wave of fake programs targeted at Mac users...
June 23, 2011 Added by:Headlines
“The FBI, collaborating with our international law enforcement and prosecution partners, have worked tirelessly to disrupt two significant cybercriminal networks. Their efforts demonstrate that no matter the country, Internet criminals will be pursued, caught and prosecuted...”
May 02, 2011 Added by:Headlines
When the user clicks on the link, they will download a file titled XvidSetup.exe. This is actually a popular adware tool known as hotbar. At present, 19 of 41 antivirus engines are blocking the file. Sadly, there will be no shortage of scams taking advantage of this historic news...
May 01, 2011 Added by:Global Knowledge
The rogue security software will be accompanied by deceptive sales tactics and false positives to lure you into purchasing a software license or security subscription. This is known as scareware. Don’t take the bait unless you are in the mood for additional malware...
January 05, 2011 Added by:Headlines
The Washington State Attorney General's office alleged Ascentive's product came loaded with adware and was designed to produce endless pop-up warnings that unduly exaggerated security risks. The company was also accused of making unauthorized and excessive charges for services without notifying customers...http://www.computerworld.com/s/article/9203258/Finallyfast.com_maker_to_refund_thousands_in_...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013