Do you use the same smartphone at home and at work? Whether your company allows employees to bring in personal devices or issues office-specific phones and laptops, those devices likely contain sensitive corporate and personal information. Unfortunately, many people use these devices in ways that can jeopardize the security not only of your personal data Read more…
We have blogged before about mobile spam messages, and while email spam declined in the past year to around 66%, mobile spam—although not yet that prevalent—is now gaining ground.
Currently the “winning ticket” theme is making i…
Have you been bullied lately? Probably not, but to get you in the right mindset, think about your commute this morning, and that car that cut you off… Feel it now? That’s what it feels like for your kids when they get bullied, online, anonymously. Imagine that driver posts online about cutting you off, mocking Read more…
Question of the week: I have avast! Free Antivirus on my computer and I love it, but isn’t antivirus for a smartphone overkill? I mean, there are not so many threats to a phone, are there? This is a question being asked by lots of security firms lately, and the answer is a resounding, YES. […]
Contributor: Avdhoot Patil
Phishers have already shown interest in the violence that erupted recently in various parts of the Arab world. The phishing attack involving Syria is a good example. Phishers are now taking advantage of the political unrest i…
Did you know that while you innocently play games or browse Facebook on your smartphone or tablet, someone might be tracking your every move? Through a stream of data “leaked” by your mobile gadgets, cybercriminals can determine which direction you’re headed, how fast you’re walking and how long your strides are. Leaked data can even Read more…
The short answer is yes! You should be concerned. And even if you’re not concerned for yourself, with the Internet all of us are interconnected so cybercrime does not just affect one person or one group, but all of us. Imagine your body being targeted by 100 million viruses. That is exactly what cybercriminals are Read more…
リンクをクリックすると、図 2 のように感染した Web ページが開きます。この Web ページには、事件現場を収めた一連のビデオが表示されています。ページの最後には、読み込み途中のビデオがあり、Red 悪用ツールキットにリンクされています。これが、ユーザーのコンピュータ上でさまざまな脆弱性を悪用します。悪用に成功すると、boston.avi_______.exe というファイルのダウンロードするよう求めるポップアップが表示されます。
図 2. 感染した Web サイト
スパムメールメッセージには、以下のような件名が使われています。
件名: 2 Explosions at Boston Marathon(ボストンマラソンで 2 度の爆発)
件名: Explosion at Boston Marathon(ボストンマラソンで爆発)
件名: Explosion at the Boston Marathon(ボストンマラソンで爆発)
件名: Boston Explosion Caught on Video(ビデオがとらえたボストンマラソン爆発の瞬間)