
Cyber Criminals Using fear
Prey on IT security fears and fool users into believing their computer have a problem when their computer does not. Such attacks, commonly know as scareware or rogueware love to prey on our computers. the fake antivirus software business is a growing business continues to be a big earner for cyber criminals.
Usually, scareware is planted on websites in the form of pop-up advertisements, or disguised downloads. Many times however, there have also been occasions when hackers have spammed out scareware, or links to it, using from an average of five dtectedper day during 2008.
Many hacking gangs have become proficient at rapidly producing professional - looking fake websites posing as legitimate security vendors. Bogus anti-virus software has also been distributed by poisoning the results of popular search engines through search engine optimization [SEO] techniques and other affiliate schemes
Many other attempts . . . . .
Beatty and Shania Twain in their attempts to steal money38.
• March Hackers used Natasha Richardson’s untimely death in advantageously39 stuffing webpages with keywords about the late actress in order to lure unwary surfers into visiting their dangerous sites and infecting their computers.
• March Hackers capitalized on a widespread issue with Symantec’s Norton Anti-Virus product40, poisoning search engines in an attempt to cash in on unsuspecting computer users searching for advice.
• June Opportunistic cybercriminals took advantage of the deaths of Farrah Fawcett41 and Michael Jackson42 to spread malware and spam.
Prey on IT security fears and fool users into believing their computer have a problem when their computer does not. Such attacks, commonly know as scareware or rogueware love to prey on our computers. the fake antivirus software business is a growing business continues to be a big earner for cyber criminals.
Usually, scareware is planted on websites in the form of pop-up advertisements, or disguised downloads. Many times however, there have also been occasions when hackers have spammed out scareware, or links to it, using from an average of five dtectedper day during 2008.
Many hacking gangs have become proficient at rapidly producing professional - looking fake websites posing as legitimate security vendors. Bogus anti-virus software has also been distributed by poisoning the results of popular search engines through search engine optimization [SEO] techniques and other affiliate schemes
Many other attempts . . . . .
Beatty and Shania Twain in their attempts to steal money38.
• March Hackers used Natasha Richardson’s untimely death in advantageously39 stuffing webpages with keywords about the late actress in order to lure unwary surfers into visiting their dangerous sites and infecting their computers.
• March Hackers capitalized on a widespread issue with Symantec’s Norton Anti-Virus product40, poisoning search engines in an attempt to cash in on unsuspecting computer users searching for advice.
• June Opportunistic cybercriminals took advantage of the deaths of Farrah Fawcett41 and Michael Jackson42 to spread malware and spam.
No comments:
Post a Comment