| Looks like cybercriminals have turned social networking into a minefield of threats where one wrong move may have very serious consequences. Long gone are the days when you could avoid being scammed simply by using antivirus software. The more aware we are the harder bad guys are working on fooling us. And let me tell you, their techniques are getting more and more sophisticated! Have a look at some examples of the latest cyber criminals’ creations and how to avoid them. - Koobface (social networking worm). It gains access to Facebook profile pages and directs you to view a video that then encourages you to update your Flash player. Malicious files such as flash_update.exe and bloivar29.exe are being downloaded and installed which results in a range of visible problems, including modifications to your Facebook profile, with the immediate result being an error message to contact support. There is also the very real potential for your identity and finances to be compromised!
- Picture files carrying malware are "planted" on social networking websites and instant messaging programs. Hackers try to convince you that your friend has sent you a message or IM to view pictures. Legitimate looking URL when clicked on sends you to an illegitimate website hosting malicious files and executables, which have been modified to appear to be genuine picture files (jpg, gif or bmp). When you download and open those "pictures"; the malware unknowingly runs on your computer. It allows hacker to take control over your operating system as well as the information in it and exposes you to identity fraud and financial loss!
- UPS Delivery Threat, also known as Zbot. It delivers an illegitimate file when you are visiting a counterfeit UPS delivery site. Zbot has been known to distribute via email phishing and instant messenger. Upon informing you that you have missed a UPS delivery, the message urges you to view the invoice online, which in fact sends you to the counterfeit website which downloads a malicious program designed to bypass the firewall and then steal banking and personal information.
|
1 comment:
I definitely love this site.
https://lamissibrahim11.wixsite.com/prokr2020
https://prokr2020.hatenablog.com/
https://www.docdroid.net/TtGIByy/shrkat-nkl-athath-oaafsh-balryad.docx
https://www.prokr.net/ksa/jeddah-water-leaks-detection-isolate-companies/
Post a Comment