Author Archives: Hacker Medic

Telugu Movie “Brindavanam” Featured in Phishing Attempt

Contributor: Avdhoot Patil

Phishers continue to target Indian movies with phishing scams. The phishing site featuring the movie “Bodyguard” is one example, and this month Symantec observed a phishing attack in which phishers used a song from the Telugu movie “Brindavanam” as bait.

image1.jpg

The phishing site displayed a picture of a musical number from the movie “Brindavanam” starring Telugu actresses Samantha and Kajal Aggarwal in the left side of the phishing page. There is also a plot summary of the movie below the image. The phishing page then encouraged users to enter their login credentials stating that, after logging in, they could watch the video. The pictured musical number from the movie was taken from the legitimate movie website. After login credentials are entered, users are redirected to this legitimate movie website which features the same video. Due to the popularity of this musical number, and the star cast, phishers were probably hoping for a large audience, increasing the number of user credentials they could steal.

The phishers’ redirection to a legitimate Web page is to create the illusion of a valid login for duped users. If users fell victim to the phishing site by entering their login credentials, phishers would have successfully stolen their information for identity theft purposes. The phishing site was hosted on server based in Montreal, Canada.

Users are advised to adhere to the following best practices to avoid phishing attacks:

  • Do not click on suspicious links in email messages
  • Do not provide any personal information when answering an email
  • Do not enter personal information in a pop-up page or screen
  • Ensure the website is encrypted with an SSL certificate by looking for the padlock, “https”, or the green address bar when entering personal or financial information
  • Update your security software frequently (such as Norton Internet Security which protects you from online phishing)

Phishers Spoof Bank’s Security Guidance Web Page

Contributor: Sandeep Ingale
When it comes to financial organizations, being informed about best security practices is every customer’s right. Many organizations provide this information on their websites to help their customers learn how to take …

5 Signs You Are About to be Scammed

      No Comments on 5 Signs You Are About to be Scammed

Smart people are scammed every day because they think it can’t happen to them or they just aren’t aware of the scams. And the scammers have gotten very good at disguising their scams, so it’s often hard to recognize them. Scamming generally involves a form of social engineering. Social engineering is the act of manipulating Read more…

2013 ISTR Shows Changing Cybercriminal Tactics

The Symantec Internet Security Threat Report (ISTR) 2013 reveals how the threat landscape is evolving, compiling information from more than 69 million attack sensors in 157 countries around the world. This year’s report shows more targeted attack…

Four Types of Parents

      No Comments on Four Types of Parents

When Online Safety Expert Taylor Tompkins and I speak with parents about how to keep their kids safe online we encounter these four types of parents.  Which one are you? Type 1:  Hopeless hapless OMFG we are doomed!!!!! Defining traits: Overrun, intimidated “My kid has found out how to stream illegal movies from our home Read more…

PCI Compliance – The Value of Getting Your Business Certified

If you operate an online business that accepts credit or debit cards, then you are probably familiar with the Payment Card Industry Data Security Standards (PCI DSS). We’ve discussed the benefits of PCI Compliance before, and it is crucial to ensure that your business becomes and remains in compliance with these requirements. As more and Read more…

How to Securely Dispose of Your Old Smartphone

How many of us have simply restored a phone to its factory settings before recycling it or selling it on Craigslist? What if I told you that there could still be data left behind? This week, a mobile forensics team released the results of an experiment meant to discover what kind of data lurks on Read more…

Trouble, Trouble, Trouble – The App Your Kids are Using Now: Ask.fm

It’s a familiar story. 7th grader has a birthday party, can only invite 5 friends, pictures of said birthday party are posted on Instagram, the next thing you know, anyone not invited to the party is upset, parents are calling, asking why their child wasn’t invited, groups are formed at school, each one taking a Read more…

Game of Thrones Fans Beware: TV Show Download Could Put You at Risk

Fans of the epic fantasy series Game of Thrones were understandably eager for the season premier earlier this month. After all, we’d waited since mid-2012 to renew our shared hatred for the most abhorrent monarch in television history, King Joffrey.  But while the show’s popularity is good news for creators David Benioff and D.B. Weiss, Read more…

What Should I Know about Mobile Cybercrime?

The Internet has dissolved the geographical boundaries and technological limitations that have constrained organized cybercrime in the past. We now live with cybercrime syndicates based in the US, Russia, Asia and all over the globe. When hackers in the US are sleeping, the ones in China are flexing their fingers on their keyboards, and the Read more…