Posts Tagged ‘Internet fraudsters’

counterfeitWith the development of internet technology, more and more often, when the victim of thieves, killers and papparatsi (especially in the case of well-known people) are regular users of the network, and even casual gamers.

Greatest weapon hackers are news or unique facts for the sake of access to different users enter personal data (passwords to e-mail, in the social pages. Networks, etc.).

A few days ago a major scandal erupted when the Xbox LIVE users began to complain that their email boxes started coming spam. Herb Lawrence, one of the heads of department of development MIcrosoft, said that the recent increase in the occurrence of resources that promote pre-order and registration to testing the new Xbox 720. He appealed to all to be careful, because the company does not intend to carry out such actions for ordinary users. (more…)

HackersPandaLabs by company Panda Security has discovered a new scam campaign on the Internet.

This new scam is realized through e-mail and well-timed to the start of the season of Christmas sales. The user receives an e-mail claiming to be from a false report of express mail FedEx, by which have been tricked into downloading a computer worm Kuluoz.A and fictitious antivirus program called System Progressive Protection.

“From the beginning of the season of Christmas sales all are looking for gifts for their loved ones and often buy on the Internet. Cyber ​​criminals use this time of year to spread malicious emails designed to trick users and steal their money, “ – says Luis Corrons, Technical Director of PandaLabs.

Spam message looks like it came from the Express Mail FedEx. Message contains a link to download a ‘receipt’ for ‘send’. If the user clicks on the link, it goes to a web page where the downloaded file with a .zip called Postal Receipt. The archive contains an executable file icon Word, loads the worm variant Kuluoz.A., Which, in turn, attempts to connect to a remote server to receive commands from the hacker and perform various malicious actions on the infected computer, including launching files. (more…)