>Scam Email – Facebook Website Update
December 31, 2010 Leave a comment
> Tweet Click images to see email, just mark as spam and ignore this
www.facebook.com/bulldog.estate
December 31, 2010 Leave a comment
> Tweet Click images to see email, just mark as spam and ignore this
December 31, 2010 Leave a comment
Tweet Click images to see email, just mark as spam and ignore this
December 31, 2010 1 Comment
> Tweet Geinimi Android Trojan horse discovered
nakedsecurity.sophos.com
There has been something of a sting in the tail of the year for lovers of the Android mobile operating system, as researchers uncovered a new Trojan horse.
The Troj/Geinimi-A malware (also known as “Gemini”) has been seen incorporated into repackaged versions of various applications and games, and attempts to steal data, and may contact remote URLs.
Although some media reports have portrayed Geinimi as the first ever malware for the Google Android operating system, this isn’t correct. For instance, in the past we’ve seen banking malware has been found in the Android Market, security researchers have demonstrated spyware rootkits for Android devices, and users have been warned about Trojans from Russia which send SMS text messages to premium-rate numbers.
In the case of the Geinimi malware, the good news is that it appears not to have made it into the official Android market app store – meaning that you would only have been putting yourself at risk if you installed poisoned software from an unauthorised source. Researchers at mobile security firm Lookout say they have only seen the software on unofficial Chinese app stores.
And you have to deliberately change the settings on your Android smartphone to make it possible to install software from such “unknown sources”.
So, the sky is not falling – and it’s not the end of the the world as we know it if you love all things Android. But Android users should still be sensible about security.
Android is a much more “open” operating system than the Apple iOS used on iPhones and iPads, and Android users don’t have to jump through as many hoops to install applications that have not been made “officially” available.
And, it shouldn’t be forgotten that not all attacks are OS-specific. Phishing attacks, for instance, don’t care what operating system you’re running – they just rely on you not taking enough care about the link you are clicking on (something that’s pretty easy to do when you have a small screensize to view a – perhaps – long url).
And increasingly we are seeing examples of threats which only exist “within the browser” or spreading entirely inside a social network, never touching your smartphone’s operating system.
So there are dangers out there whatever kind of browsing device you are using. Desktop or laptop, mobile or tablet.
Sophos products can detect samples of the Geinimia Trojan we have seen to date as Troj/Geinimia.
Image source: Laihiu’s Flickr photostream. (Creative Commons)
December 31, 2010 1 Comment
Tweet Geinimi Android Trojan horse discovered
nakedsecurity.sophos.com
There has been something of a sting in the tail of the year for lovers of the Android mobile operating system, as researchers uncovered a new Trojan horse.
The Troj/Geinimi-A malware (also known as “Gemini”) has been seen incorporated into repackaged versions of various applications and games, and attempts to steal data, and may contact remote URLs.
Although some media reports have portrayed Geinimi as the first ever malware for the Google Android operating system, this isn’t correct. For instance, in the past we’ve seen banking malware has been found in the Android Market, security researchers have demonstrated spyware rootkits for Android devices, and users have been warned about Trojans from Russia which send SMS text messages to premium-rate numbers.
In the case of the Geinimi malware, the good news is that it appears not to have made it into the official Android market app store – meaning that you would only have been putting yourself at risk if you installed poisoned software from an unauthorised source. Researchers at mobile security firm Lookout say they have only seen the software on unofficial Chinese app stores.
And you have to deliberately change the settings on your Android smartphone to make it possible to install software from such “unknown sources”.
So, the sky is not falling – and it’s not the end of the the world as we know it if you love all things Android. But Android users should still be sensible about security.
Android is a much more “open” operating system than the Apple iOS used on iPhones and iPads, and Android users don’t have to jump through as many hoops to install applications that have not been made “officially” available.
And, it shouldn’t be forgotten that not all attacks are OS-specific. Phishing attacks, for instance, don’t care what operating system you’re running – they just rely on you not taking enough care about the link you are clicking on (something that’s pretty easy to do when you have a small screensize to view a – perhaps – long url).
And increasingly we are seeing examples of threats which only exist “within the browser” or spreading entirely inside a social network, never touching your smartphone’s operating system.
So there are dangers out there whatever kind of browsing device you are using. Desktop or laptop, mobile or tablet.
Sophos products can detect samples of the Geinimia Trojan we have seen to date as Troj/Geinimia.
Image source: Laihiu’s Flickr photostream. (Creative Commons)
December 31, 2010 Leave a comment
>faceTweet Scam Alert : Farmville Rewards Program
Scam Page :http://www.facebook.com/pages/Farmville-Rewards-Program/140537842669100?v=app_176778345687783
Defined – A malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocent looking Web pages. It will usually execute without the user’s knowledge, through a button on the web page that appears to perform another function.
Examples can be as follows: The user receives an email with a link to a video about a news item, but another valid page, say a product page on amazon.com, can be “hidden” on top or underneath the “PLAY” button of the news video. The user tries to “play” the video but actually “buys” the product from Amazon.
Other known exploits have been:
- Tricking users to enable their webcam and microphone through Flash (which has since been corrected by Adobe);
- Tricking users to make their social networking profile information public.
- Making users follow someone on Twitter.
- Share links on Facebook.
Damage Control written by Mr. Black Knight (Co-admin BDE) Owner
December 31, 2010 Leave a comment
faceTweet Scam Alert : Farmville Rewards Program
Scam Page :http://www.facebook.com/pages/Farmville-Rewards-Program/140537842669100?v=app_176778345687783
Defined – A malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocent looking Web pages. It will usually execute without the user’s knowledge, through a button on the web page that appears to perform another function.
Examples can be as follows:Â The user receives an email with a link to a video about a news item, but another valid page, say a product page on amazon.com, can be “hidden” on top or underneath the “PLAY” button of the news video. The user tries to “play” the video but actually “buys” the product from Amazon.
Other known exploits have been:Â
- Tricking users to enable their webcam and microphone through Flash (which has since been corrected by Adobe);
- Tricking users to make their social networking profile information public.
- Making users follow someone on Twitter.
- Share links on Facebook.
Damage Control written by Mr. Black Knight (Co-admin BDE) OwnerÂ
December 31, 2010 Leave a comment
> Tweet Scam Alert: Farmville Click Jacking Website
Defined – A malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocent looking Web pages. It will usually execute without the user’s knowledge, through a button on the web page that appears to perform another function.
Examples can be as follows: The user receives an email with a link to a video about a news item, but another valid page, say a product page on amazon.com, can be “hidden” on top or underneath the “PLAY” button of the news video. The user tries to “play” the video but actually “buys” the product from Amazon.
Other known exploits have been:
- Tricking users to enable their webcam and microphone through Flash (which has since been corrected by Adobe);
- Tricking users to make their social networking profile information public.
- Making users follow someone on Twitter.
- Share links on Facebook.
Damage Control written by Mr. Black Knight (Co-admin BDE) Owner
December 31, 2010 Leave a comment
Tweet Scam Alert: Farmville Click Jacking Website
Defined – A malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocent looking Web pages. It will usually execute without the user’s knowledge, through a button on the web page that appears to perform another function.
Examples can be as follows:Â The user receives an email with a link to a video about a news item, but another valid page, say a product page on amazon.com, can be “hidden” on top or underneath the “PLAY” button of the news video. The user tries to “play” the video but actually “buys” the product from Amazon.
Other known exploits have been:Â
- Tricking users to enable their webcam and microphone through Flash (which has since been corrected by Adobe);
- Tricking users to make their social networking profile information public.
- Making users follow someone on Twitter.
- Share links on Facebook.
Damage Control written by Mr. Black Knight (Co-admin BDE) OwnerÂ
December 31, 2010 Leave a comment
> Tweet This is a Farmville Clone page
Scam Application: http://apps.facebook.com/farmvfbaeebaf/
Scam Fan Page: http://www.facebook.com/apps/application.php?id=146410742065990&v=wall
Defined – A malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocent looking Web pages. It will usually execute without the user’s knowledge, through a button on the web page that appears to perform another function.
Examples can be as follows: The user receives an email with a link to a video about a news item, but another valid page, say a product page on amazon.com, can be “hidden” on top or underneath the “PLAY” button of the news video. The user tries to “play” the video but actually “buys” the product from Amazon.
Other known exploits have been:
- Tricking users to enable their webcam and microphone through Flash (which has since been corrected by Adobe);
- Tricking users to make their social networking profile information public.
- Making users follow someone on Twitter.
- Share links on Facebook.
Damage Control written by Mr. Black Knight (Co-admin BDE) Owner
December 31, 2010 Leave a comment
Tweet This is a Farmville Clone page
Scam Application: http://apps.facebook.com/farmvfbaeebaf/
Scam Fan Page: http://www.facebook.com/apps/application.php?id=146410742065990&v=wallÂ
Defined – A malicious technique of tricking Web users into revealing confidential information or taking control of their computer while clicking on seemingly innocent looking Web pages. It will usually execute without the user’s knowledge, through a button on the web page that appears to perform another function.
Examples can be as follows:Â The user receives an email with a link to a video about a news item, but another valid page, say a product page on amazon.com, can be “hidden” on top or underneath the “PLAY” button of the news video. The user tries to “play” the video but actually “buys” the product from Amazon.
Other known exploits have been:Â
- Tricking users to enable their webcam and microphone through Flash (which has since been corrected by Adobe);
- Tricking users to make their social networking profile information public.
- Making users follow someone on Twitter.
- Share links on Facebook.
Damage Control written by Mr. Black Knight (Co-admin BDE) OwnerÂ