Search Results for
BEC
‘Pigeon drop’ scam adapted to technological advances
Computer fraud is an everyday issue. We are becoming accustomed to hearing on the news about criminal groups that clone credit cards, hack mail accounts,…
Trick or treat? Cyber-crooks exploit Halloween to infect users
Hackers once again use the most popular issues to camouflage malware on spoof websites  Panda Security, The Cloud Security Company, has uncovered a new…
Blackhat SEO Aggressively Targets Halloween Related Keywords
Cyber criminals behind the Rogueware epidemic have been hard at work in poisoning search results to increase traffic to their campaign sites. Today, we identified…
Fake antivirus programs hijack and block computers
The rogueware business has evolved to incorporate ransomware techniques, based on the hijacking of users’ information Infected computers are extremely difficult to clean manually, forcing…
What should I do if I receive spam in Twitter?
Twitter, Facebook and MySpace are highly popular social networks. Unfortunately, there are always hackers who try to exploit the success of these networks for financial…
Rogueware with new Ransomware Technologyâ„¢
The criminals behind Rogueware attacks are becoming increasingly aggressive in their approach to make money. We recently stumbled across a sample (Adware/TotalSecurity2009) which uses a…
Angelina Jolie, Barack Obama, Michael Jackson… all these names could be used as bait for E-crime
Posted by David San José September 22, 2009 On checking your mail you could find messages with enticing names of famous people, e.g. “Angelina Jolie…