Browsing articles from "September, 2014"
Sep
26
2014

Outdated Invoice from Sage Account & Payroll

Email pretending to be a Payment Reminder for Outdated Invoice from Sage Account and Payroll is being sent by Hackers. This email tricks the user to click on Link in this email asking them to download the Invoice outstanding for payment. Users are advised not to open such links for any such fake “Invoice” emails.

Net Protector customers are protected by Net Protector Web Shield and also Online Shield which detects and blocks such type of Malware.

Sep
23
2014

HSBC Payment Advice Password Stealer

HSBC Payment Advice Issued email pretending to come from HSBC Bank UK is from a current malware BOT Family.

This email contains link which download the file “PaymentAdvice.zip” which has the file “PaymentAdvice.exe” with the Acrobat PDF Icon. If you open this file it will download and run Zbot, cryptolocker, ransomware and other malware on your computer.

The malware uses email addresses and subjects that will entice and trick a user to read the email and follow the link in the email.

Sep
6
2014

Email Password Stealing Emails

Security Tip: Do not enter or use your email password on any other Site other than the actual email site. Keep separate different password for all your accounts. There are many sites for asking your emails details including password also. Don’t trust on such fake emails.

One of them are:

Many users receiving the email from Allibaba.com asking to their account holder to update the account.

Sep
5
2014

Why is Unsecured Wi-Fi So Risky?

I’m sure that at some point you have listened to the radio. A signal goes out and all radios in range can tune in to the broadcast. WI-FI is essentially a radio signal that transmits and receives data. The access point and your computer exchange information, but all computers with wireless capabilities can receive the same data that your computer sends and receives.

The way to protect your data from other computers that might be snooping is to encrypt the data.

Sep
4
2014

Pay attention on permissions before installing app

Installing an application on an iPhone is a bit different than installing an application on an Android based system. With the iPhone you go to the App Store, select your application (and pay if required) then download and install it. For the Android based phones you go to the Android Market, select your application, download it and then you must approve of the access to your phone that the application will have. For non-technical people this may seem like a waste of time, but in fact it gives you some really interesting information.

Pages:12»