VIPRE Security News Vol.1, #5 – August 10, 2011 – Issue #5 contains a list of both government and corporate email addresses to send incidents of fraud and/or phishing.
The latest issue of Vipre Security News contains some articles on email spoofing and what to do if your email account is hijacked. … email spoofing is the forgery of an email so it appears to be coming from someone other than the actual source. Spammers often use spoofing to get folks to open and… Continue reading email hacking and spoofing
This Enterprise Systems article highlights once again that protecting yourself from phishing attacks requires guidance and training. Relying on good intentions is not enough. Many are tricked into clicking on links in phishing e-mail messages anyway. The cleverness of cybercriminals can still overcome the best intentions of employees. As Sjouwerman [KnowBe4 founder and CEO Stu… Continue reading Employees Fall for Phishing
ars technica writes, “The Security Update 2011-003 that Apple released on Tuesday directly addressed the Mac Defender malware threat in two ways: it changed the way malware files are detected by enabling automatic daily updates, and included code to remove at least two of its variants.” The article further discusses Apple’s response to a growing… Continue reading Apple Security Update and File Quarantine
Apple posted this article regarding: A recent phishing scam has targeted Mac users by redirecting them from legitimate websites to fake websites which tell them that their computer is infected with a virus. The user is then offered Mac Defender “anti-virus” software to solve the issue. And MacWorld writes: Online crime falls mostly into four… Continue reading How to avoid or remove Mac Defender malware
The United States Computer Emergency Readiness Team (CERT) defines a fake anivirus as: Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it extremely difficult to terminate unauthorized activities and remove the program. It also causes realistic, interactive security… Continue reading Recognizing Fake Antiviruses
May 2011: I was glad to see a major blog take on something which has riled me as well. Like when I update Adobe Flash on every PC. Ed Bott at ZDNet conjured up the new term “foistware” for the insidious practice, even by large reputable software companies. See: “Adobe and Skype top my Foistware… Continue reading Auto opt-in’s: Free software and unwanted add-on’s