Posts Tagged ‘phishing attacks’

Spam and phishingThere were at least 72,758 unique phishing attacks worldwide (APWG: Global Phishing Survey, published 18 September 2013)

In January – June 2013 Anti-Phishing Working Group (APWG) has registered just over 72.7 million phishing web sites, whereas in the previous six months was found 123.5 thousands of such resources. Fake sites were found in 53.7 million unique domains – against 89.7 million  in 2012’s second half. Experts attribute this decline declining popularity of virtual hosting phishing community.

During the reporting period, the phishers prefer to place their traps in legal areas, compromised by mass hacking (27% of phishing sites). Have not lost their popularity and trust of registration: from 53.7 million related to the phishing domains over 12,000 phishers are registered legally. It is twice more than in July – December 2012. This increase was caused by the activation of phishing in China: according to the APWG, 68% of registered domain names used for phishing attacks on Chinese targets. In this country, there is an intensive growth of medium-income segments of the population who are willing to use e-commerce services. In this case, the Chinese phishers, according to experts, prefer to place their traps, buying domains – mostly from local or U.S. registrars. (more…)

APWG ReportAccording to a report for the I quarter of 2013, presented Anti-Phishing Working Group (APWG), there is a pronounced downward trend in the number of phishing sites. However, phishing attacks are becoming more targeted and no longer resemble “a shotgun.”

In general, reducing the number of phishing attacks from January to March 2013 was 20%. As a result, the volume of phishing indicators are the lowest in all the time since October 2011. According to experts, this can be explained by the reduced number of virtual servers, which are carried out with a phishing attack. It is estimated Co Anti-Phishing Working Group Rasmunsena Rod (Rod Rasmussen), the number of phishing sites hosted on these servers, decreased over the period from October 2012 to February 2013 from 14,400 to 1,653. “Such a drastic reduction in their number could mean that hackers have begun using the servers is not for phishing attacks, and to spread malware, or DoS-attacks,” explains Rasmunsen. (more…)

Spam and phishingThe number of Internet users, faced with phishing attacks over the past 12 months increased by 87% – from 19.9 to 37.3 million.

Most often the victims of cyber threats become residents of Russia, the U.S., India, Vietnam and the UK. These are the results of the study “The Evolution of phishing attacks in 2011-2013” conducted by Kaspersky Lab in June 2013 based on data from the cloud monitoring system Kaspersky Security Network.

Phishing –  Internet fraud in which criminals create a fake copy of a popular site (e-mail service, online banking, social networks, etc.) and the different ways to try to lure users to the Internet. The purpose of phishing attacks – get valuable user data: personal data, information for accessing banking services and accounts in social networks. Subsequently, malicious or self-use collected information to steal the victim’s money, as well as the spread of spam and malware through compromised accounts in the mail or social networks, or resell the information to other criminals. (more…)

What is spam?

Posted: March 5, 2013 in Glossary
Tags: , ,

Stop spamSpam – anonymous unsolicited bulk e-mail distribution, ie electronic equivalent of paper advertising mail, regular mail boxes littering.

Spam is most often used to advertise products and services. Spammers send out a large number of advertisements and cashing in on those who are responsible. In addition, the attackers use spam for phishing attacks and malware.

Over the past ten years has expanded the scope of the spam, and the volume of delivery – increased significantly. At first spam was being sent directly to the individual addresses of the users and it was easy to block. Over time, high-speed Internet channels that give fast and cheap opportunity to massively send spam messages. Spammers have also found that they can use for their own purposes modems individual users – modems are not equipped with means of protection against unauthorized access, and could be used by hackers from anywhere planety.Drugimi words, modems unsuspecting users send out huge amounts of spam. (more…)

PhishingThis is the conclusion reached by the experts of the survey thousands of office workers.

According to the analysis published Aaron Higbee, Technical Director PhishMe, about 49% of users have a greater fear of becoming a victim of phishing, while working at a computer at home, rather than for the workers.

According to him, in the course of the survey, participants were employees of various offices of British companies (about one thousand), it was found that 27% of them have no idea what phishing. 78% of respondents who know what I mean, sure they never become a victim of this kind of attack.

At the same time, nearly 60% of office workers receive phishing emails daily, and 6% each day are more than 10 such messages. Interestingly, almost a third of respondents did not consider it necessary to inform employees of IT-department about such incidents. (more…)

Microsoft Security EssentialsAdditional protection is designed to prevent conduct phishing attacks against users of the service.

According to the developers of Microsoft, the next time was in outlook.com supports standard DMARC (domain-based message authentication, reporting & conformance), is a technology improve security authentication protocols in the email.

Support is currently DMARC implemented in such popular resources as Facebook, Paypal and LinkedIn. In this case, in order to implement this standard on these services is to improve the protection of users from phishing and spam.

“Our implementation DMARC help protect you, visually highlighting messages from legitimate sources – the experts explain. – If the sender supports DMARC, we will place the radio button next to the message that indicates the security letters. ” (more…)