Browsing articles from "March, 2016"
Virus emails looks like an ID Scanned from Epson Scanner! Attached Zip Actually contains Malware.
Ransomware using new ways to enter user’s machine. Emails are sent with a fake email id posing to be came from Epson Scanner or Canon, with a malicious attachment.
Ransomware with email from domain of Company Industry.
This fake invoice email pretends to be from a company domain. Attachment may contain a ransomware script waiting for your click.If you open the attachment, it will start its work and you will be unable to get your valuable data.
Users are getting emails with subject line “Your Account has Been Suspended”. Such emails are sent to make user panic and force to open the attachment that may harm your PC. Attachment contains viruses, ready to start their work just after one click.
SmeshApp IM app spies on Indian Army and sends sensitive information to Pakistan owned server in Germany.
Indian TV station CNN-IBN has discovered that Pakistani officials were collecting data about Indian troop movements using an Android app called SmeshApp.
According to the TV station’s investigation, which received a tip from an inside source, Pakistan army’s Inter Service Intelligence (ISI) agency was behind an Android app available through Google’s Play Store, named SmeshApp (Google Cache link).
Trojan from Pakistan, Targets Indian Military Officers !
Attackers from Pakistan using a trojan virus have stolen passport scans, photo IDs, and tax information from 160 Indian military officers, military attaches, consultants, and resellers.
Petya Ransomware arrives via Dropbox as a Resume.
Victims receive an email tailored to look and read like a business-related resume from an applicant seeking a position in a company. It would present users with a hyperlink to a Dropbox storage location, which supposedly would let the user download said applicant’s CV.
Hackers are sending emails to corporate and business users from a real looking profile and asking for supply and quotation of products as per samples and sizes in the attached file.
Locky Ransomware emails using information of user from their Facebook profiles.
The email appears to originate from Australia Post, DHL, Fedex, Blue Dart or similar and informs the recipient about a package that has supposedly arrived for them at a local collection point. The email then directs people to download and print the attached shipping information, which contains ransomware known as ‘Locky’.
Please pay attention while opening emails having subject like urgent invoice notice, incoming transaction declined, pay your invoice.
In this digital era, parents should know how to protect their children from the dangers may faced in online activities. Below tips will help parents to teach their child how to stay safe while they enjoy the web.