Category Archives: Consumer Alerts

Yes, There are “Mother’s Day” Scams

With Mother’s Day just around the corner, cybercriminals are working up ways to take advantage of this time when you’re online looking to buy flowers, candies, perfumes, jewelry or whatever gifts for mom might be hot this year. Phishers follow a similar editorial calendar as newspaper and magazine editors, coordinating their attacks around holidays and Read more…

Are you Hackable or Uncrackable? “Password Day” is Today!

Yes, such a day exists and it’s today, May 7th 2013. Intel and McAfee are working to make sure consumers increase their security awareness and front line of digital protection by asking everyone to change their passwords today. Reuse of passwords across multiple sites is a big problem. In the digital world, many of us Read more…

Password Safety In A Connected World

It has become increasingly common for personal and professional social media accounts to become ‘hacked’, or taken over by someone who doesn’t own the account. Twitter’s help center points out that this occurs from weak passwords, a pre-existing password-collecting virus on your computer or by entrusting your login credentials to malicious third-party websites and applications. Read more…

Regents of Louisiana spreading Sirefef malware

I was given a suspicious website link pointing to the website belonging to Board of Regents of State of Louisiana. This link points to the main website hxxp://regents.la.gov/, followed by /wp-content/upgrade/<numbers>.exe, where <numbers>.exe represents several random numbers, followed by EXE extension. A link looking like the following one hxxp://regents.la.gov/wp-content/upgrade/<some_numbers>.exe seems suspicious at first glance. Websites […]

Massive U.S. cyberattack planned by Anonymous

“In the cross hairs of anonymous” The hacktivist group Anonymous announced phase one of a massive cyberattack, called Op USA,  on U.S government and banking websites scheduled for next Tuesday, May 7. The White House, the NSA, and the FBI are included on a list of high profile government targets, and 133 financial institutions including the […]

BadNews for Good People

      No Comments on BadNews for Good People

Bugs. Creepy, crawly, never-really-know-where-they’re-hiding, infestations of bugs. If we could just see them all, we would rid our lives of bug infestations with doses of (environmentally friendly) spray. But what about the bugs that we can’t see? What about the bugs that have snuck past, and infiltrated the hidden corners of our lives, then quietly Read more…

avast! Antivirus gets cameo role in Movies vs. Life viral video

A YouTube video called Movies vs. Life compares scenes embellished with movie magic to their real-life equivalents. We like to think that an avast! Antivirus cameo during a computer hacking scene (pay attention around 0:22 seconds) is one of the reasons that this hilarious video has gone viral. A round of applause from avast! to […]

The Next Phase of Mobile Advertising: Conversing With Your Phone

Imagine this: You’re walking past your favorite store and your phone buzzes to ask you if you like the new spring collection. Or maybe it wants to know what you think about the new running shoes displayed in the storefront just up ahead. Conversations with your phone aren’t just something to imagine anymore; recently companies Read more…

High profile site scares users

      No Comments on High profile site scares users

We come across a plenty of malware reports every day. Sometimes we have to deal with some special cases, where a respected vendor is involved. This time it was the Dell driver download site. The “Download file” link leads to this unexpected screen (our user complained about a false positive): Well, being an average user, […]

Visualizing A DDoS Cyber Attack

      No Comments on Visualizing A DDoS Cyber Attack

As you may recall from earlier posts in my blog, a denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the hacker’s botnet, or network of infected computers. Usually, when a cybercriminal launches a DDoS attack on a website, there isn’t much for Read more…