Posts Tagged ‘scam’
If being single isn’t tough enough, all the baddies on the internet are going after their dating profiles. AshleyMadison was the big profile hack, complete with leaks, and now, Match.com has been compromised as well.
A security alert was issued by an outfit called Malwarebytes, and they noted that the dating site was hacked and has spilled data all over the place. A hackers version of a money shot, if you like.
Malwarebytes said the site has fallen victim to malvertising, which looks to swindle the lonely out of their hard earned money. It is thought that there’s 5.5 million users at risk from this attack, which happens to be based on the Bedep trojan for those of you who know about this sort of thing. In plain English, it means that ne’er-do-wells can get at a load of private info and start trying to cadge money from you.
“The cost per thousand impressions for the booby trapped ad was only 36c, which is nothing compared to how much infected computers can bring in terms of revenues. For instance, CryptoWall demands $500 per victim,” said Jerome Segura, senior security researcher at Malwarebytes.
“We alerted Match.com and the related advertisers, but the malvertising campaign is still ongoing via other routes.”
A spokesperson for Match.com told The Inquirer: “We take the security of our members very seriously indeed. We are currently investigating this alleged issue.”
Even though Apple’s iOS is well regarded for its robust security, it isn’t completely without the risk of some swine causing bother with it. If you jailbreak a phone, you do away with all that lovely security so you can get full control of your gadget.
With that, malware is being installed via third-party iOS apps onto jailbroken iPhones, which has resulted in what is being described as “the largest known Apple account theft caused by malware.”
The malware is called KeyRaider, and has stolen around 225,000 iOS users’ Apple account credentials, purchasing receipts, certificates and private keys according to the security firm, Palo Alto Networks and Chinese iPhone developers Weiptech.
And now, for a lot of jargon.
“The malware hooks system processes through MobileSubstrate, and steals Apple account usernames, passwords and device GUID by intercepting iTunes traffic on the device. KeyRaider steals Apple push notification service certificates and private keys, steals and shares App Store purchasing information, and disables local and remote unlocking functionalities on iPhones and iPads,” the Palo Alto Networks wrote in a blog post.
So what’s happening, in plain English? Around 225,000 accounts are thought to be affected, and some people have said that their accounts are showing abnormal purchasing history. Others have said that their phones are being held for ransom by people who are best described as ‘not-rights’.
If you don’t have a jailbroken iPhone, iPad or iPod, then you don’t need to do anything at all. You’re golden. Those with affected jailbroken phones reside in countries including the UK, France, Germany, Australia, Russia, Japan, America, Canada, Israel, Italy, Spain, Singapore, and South Korea.
You can read all of Palo Alto Networks findings and check out their tool which will help you to check if your device has been affected and some other helpful bits… click here.
Volkswagen won a high court case to keep the paper from being unpublished, written by the University of Birmingham’s Flavio Garcia, and two colleagues from a university in the Netherlands.
The team found that car manufacturers including Audi, Volvo, Citroën, Honda and Fiat, as well as the aforementioned Volkswagen, had cars that were exposed to ‘keyless theft’ thanks to a device that was supposed to stop cars from being nicked, could be easily disabled.
And now, after a series of negotiations, Volkswagen have agreed to the report being published after getting one sentence removed from the original paper.
Garcia, and Roel Verdult and Bariş Ege from Radboud University in Nijmegen, said that they discovered flaws in the Swiss-made immobiliser system called Megamos Crypto, which is a device that stops the engine from starting when the corresponding transponder (which is embedded in the key) is not present.
However, it was found that it was possible to listen to signals sent between the key and the security system, which means that cars could be attacked by “close-range wireless communication.”
“Our attacks require close range wireless communication with both the immobiliser unit and the transponder,” say the team. “It is not hard to imagine real-life situations like valet parking or car rental where an adversary has access to both for a period of time. It is also possible to foresee a set-up with two perpetrators, one interacting with the car and one wirelessly pickpocketing the car key from the victim’s pocket.”
An injunction stopped the report from seeing the light of day, with Volkswagen arguing that the report would basically give criminals an idea or two. However, the research team brushed that complaint aside, saying that they were “responsible, legitimate academics doing responsible, legitimate academic work”.
This of course, follows the recall of 1.4m Fiat Chrysler vehicles, after some hackers got control of a Jeep.
You need to install updates on your browser at once, because there’s an exploit in it that wants to steal your data and has been turning up on websites and causing havoc.
Right away, go to Help, then hit ‘About Firefox’, then press the ‘Check for Updates’ button, to ensure you’ve got the latest version of the browser.
In a blog, Mozilla say the exploit makes use of a weakness in Firefox’s PDF viewer. The bug basically gets into your Windows computer and searches through your files looking for passwords from a host of popular FTP apps, as well as any text files with ‘pass’ or ‘access’ in the name. It will then, you suspect, send all that information to people who you really don’t want to be having that sort of information.
Even if you’re on a Mac and using Firefox, it’d be a good idea to do an update, as there’s no good reason why the baddies aren’t going after you too. So hurry up. Update your Firefox. Do it now!
How the Android fanboys laughed at the Apple fanboys, when there was a text message that could crash iPhones.
Well, the Apple crew can get their own back now, as there’s news of a text that can really stuff things up for Android devices. The rest of us, meanwhile, can wonder why people argue about which phone you should have. Seriously. Go for a walk or something.
Anyway, what’s this flaw? Well, seeing as most Android phones automatically download photos, and there’s a scam going around that enables hackers to take control of your phone via photo messages, and there’s 950 million Android users worldwide, we’ve got a problem.
The picture in question allows nasty sorts to get complete control of Android devices, accessing your camera and everything else. Thanks to Android phones automatically downloading photos in texts, you wouldn’t even need to open it to be vulnerable to the malware.
So what are Google doing about it?
They said: “This vulnerability was identified in a laboratory setting on older Android devices, and as far as we know, no one has been affected. As soon as we were made aware of the vulnerability we took immediate action and sent a fix to our partners to protect users.”
“As part of a regularly scheduled security update, we plan to push further safeguards to Nexus devices starting next week. And, we’ll be releasing it in open source when the details are made public by the researcher at BlackHat.”
There you go then.
We told you about the trouble surrounding Adobe Flash and how the hackers might come after you. Well, the software is now automatically blocked by all versions of the Firefox browser. Remember Firefox? Awww.
Anyway, Mozilla – the people behind Firefox – have brought in the block, which saw cyber-scallies able to do all manner of dodgy things, including stealing documents from a security firm. Mozilla said that this block will stay until ”Adobe releases an updated version to address known critical security issues”.
Adobe have said that they’re taking all this very, very seriously and that they’re working on fixing the bugs and flaws.
Mozilla have given out advice on how to adjust Firefox’s settings so Flash will only run with your permission. You can see that here. Or, you can click here to make sure you have the latest version of Flash, but it is advised that you stop using it at all, for the time being.
You should only activate Flash on sites that you trust.
Facebook’s security chief Alex Stamos, wants Flash killed off completely, saying: “It is time for Adobe to announce the end-of-life date for Flash and to ask the browsers to set killbits on the same day.”
Adobe have said that the patches to fix all the Flash troubles should be made available to everyone at some point this week, so until then, stay vigilant or continue with your cavalier attitude. Whatever. We’re not your real dad.
According to the Information Commissioner’s Office (ICO), there’s been a rise in spam calls and texts, with more than 180,000 complaints made about these nuisances in the last year alone. That’s a 12% rise, compared with the year before.
The watchdog also said that they’d issued five fines relating to all this, totalling £386,000, alongside eight enforcement notices, with another 31 firms being “monitored”.
The said: “Most concerns related to accident claims, green energy deals, payday loans and lifestyle surveys. Live calls generate significantly more concerns than automated calls and spam texts.”
One of the reasons there’s been a spike, is that this year, the law was changed, to make it easier for companies to be fined for breaching rules regarding nuisance calls and texts. The ICO have also been doing a load of investigations where allegations of personal data being obtained or disclosed illegally. In one case, a Transport for London employee was prosecuted for illegally accessing Oyster card records.
Launching the report, the information commissioner, Christopher Graham, said: “We’ve seen real developments in the laws we regulate during that time, particularly over the past year. Just look at the EU court of justice ruling on Google search results, a case that could never have been envisaged when the data protection law was established.”
The executive director of Which!!!, Richard Lloyd, said that this was jst “tip of the iceberg”, adding: “This is why regulators, government and industry must work harder to cut off unwanted calls and texts that annoy millions of us every day. The ICO must use its new powers to full effect and hit hard any company breaking cold-calling rules. We also want to see senior executives personally held to account if their company makes unlawful calls.”
As well as being exploited by a Chinese hacker crew, it has now been added to the Magnitude exploit kit, which enables amateur malware authors to build all manner of software which could make your life difficult. There’s already been some attempts to install ransomware on some computers.
Adobe have confirmed that the flaw is being jumped on by hackers, especially those using Internet Explorer on Windows 7 and Firefox on Windows XP. Even if you aren’t using these things, you should still sort your life out and update your Flash.
If you prefer, you can just get rid of Flash. As most computers come with it built-in, even though it isn’t the crucial thing it once was, this means hackers are always tempted to attack it.
If you’re using Chrome, your browser updates it automatically. If not, click here to see if you have the latest version of Flash and, if you don’t, update it now.
Careful on your phone, now! Why? Criminals are sending people text messages that look like they’re from your bank – but they’re not! And of course, they’re after you juicy bank details so they can steal your pennies.
So what’s the skinny? Well, the texts claim that there has been fraudulent activity in your account or, in a more sly move, that your account details need to be updated. A phone number and website are provided, saying that the matter is very urgent.
Of course, the number and website is controlled by scammers, and Financial Fraud Action UK, have warned that this type of hoodwinkery is on the rise, with a spike in the last couple of weeks.
To make the texts seem authentic, fraudsters use specialist software which alters the sender ID on a message so that it appears with the name of a bank as the sender. This can mean that the text becomes included within an existing text message thread on the recipient’s phone.
Katy Worobec, director of Financial Fraud Action UK, said: “These text messages can look very authentic, so it’s important to be alert. Always be wary if you receive a message out of the blue asking you for any personal or financial details. If you’re ever at all suspicious, call your bank on a number that you know. Remember, fraudsters are after your security details – don’t reveal anything unless you are absolutely sure who you are dealing with.”
Of course, what normally happens when there’s fraud, is that your bank will ring you up and tell you what’s going on. There, you’ll go through security and other means to put your mind at ease. If your bank texts you, ever, it is usually to sell you something, so be aware. However, some fraudsters will send a text to say you’ll be receiving a call from your bank’s fraud department, which makes the whole thing more complicated.
Things to look out for
If you get a text, asking you for your personal details and sensitive information, chances are, it is a scam. A bank will never ask for your full password.
If you’re asked to call the number given in the text message, it’d be worth entering the number online, as it is likely to come up as a scam number. If you’re unsure, get a number you trust, like one included on your statement or one from your bank’s official website.
Your bank will never ask you to update your personal details via a link in a text, or tell you how to respond to a text message to confirm a transaction. They will also never ask you to transfer money into another account, ever. So if you get a whiff of anything that sounds dodgy, don’t do it.
The watchdog sent an illegal Vauxhall Astra with broken and missing light bulbs, irregular tyre pressures, oil leaks and faulty windscreen wipers to the centre in Filton, Bristol. The car was supposed to get a major service, which should’ve cost £235.
Investigators soon found that something was amiss, and told North Avon Magistrates’ Court: “It became obvious that not all the checks were done. Things were ticked as having been done that had not been and the consumer was not made aware (of the defects).”
“This is a national company. A consumer puts a lot of trust and faith in a national firm to do a proper job to ensure a car service is conducted thoroughly and professionally and in these circumstances it was not.”
This won’t allay some of the fears that many drivers have, that they’re being ripped off when it comes to getting their cars fixed or given the once over. This uncover sting came about after the number of complaints about the car industry in the area, were rather high.
Halfords pleaded guilty to eight counts of breaching consumer protection laws and the mechanic who carried out the service, has since resigned. Magistrates fined the company £32,000, ordered them to pay £14,862.04 costs and a £120 victim surcharge.
According to research, there’s around 2.8 million of you out there who have downloaded Minecraft applications on their Android smartphones and tablets, which are malicious.
There’s been a host of dodgy apps doing the rounds in the last year, and 33 of them have been spotted in the Google Play store. These apps tend to offer cheats and tips to players, but of course, they’re doing something else that is no good for you at all. Once you download these apps, you end up getting a warning which says your device has been infected with a “dangerous virus”.
These are some of the malicious apps.
If the apps fool you, you’re then asked to sign-up with a premium-rate SMS subscription which tells you that it’ll rid your gadgets of nasties.
It won’t, of course. What it will do is charge you for texts, coming in at £3.40 per week, which is around £177 per year if you don’t sort it out. The bogus virus warning page looks like this.
One of the things that gives away these apps are the myriad of negative reviews and comments they’ve received. If you’re ever downloading any app, it is always worth looking at the score they’ve been given and checking out the reviews on Google Play, right before you hit the download button.
A number of the apps have been removed from Google Play, but that’s not to say they got them all. Obviously, snide developers are probably making more and tying them in the with hugely popular Minecraft game.
Like we said, to stop this happening, always look at the ratings and reviews on any app and get some security software for your Android phone. You can see some of the best anti-virus Android software here.
A bloke called Paul spied the incident from a window on Caledonian Road, saying that the worker used bolt cutters to chop the lock before throwing the bike into the back of his van.
Paul told Metro.co.uk: “UK Power Networks have been working on the road for quite some time. I was on the phone leaning against the window and one of them wasn’t working and looking quite suspicious so my attention falls on him.”
“Then he goes over to the bike and cuts the lock. He waited for some time, then he walked back over and took the bike.”
At this point, our Paul went outside to have a word and of course, he filmed the whole thin. He asked the UK Power Networks employee why he had the bike in the van. He claims; ‘”because it was there dumped”. However, our gallant hero points out that this is a load of cobblers, leaving the worker to deny cutting the lock and repeatedly saying ‘sorry mate’.
A spokesperson for UK Power Networks said: “We take any allegations of wrongdoing extremely seriously and will follow all appropriate procedures to ensure a full investigation is carried out and relevant action is taken.”
“We are currently liaising with the person who recorded the film to ensure the matter is resolved.”
Have a look at this yourself and you can decide whether or not this bloke is a dirty tea-leaf.
A steward for Ryanair found a passenger’s camera on a flight. Now, you’d think they’d hand it in to lost property and that would be the end of it, right?
Well, this particular steward thought he’d have it for himself and flog it on eBay. Fernando Miguel Andrade Viseu didn’t realise these things can be tracked and on the auction, he found he’d got a message from the owner.
The camera owner, a teacher called Aaron Galloway, was going on a break when he forgot his camera on the seat of the plane. He told the crew about it and they said they saw no sign of the £499 Nikon camera.
Galloway got home, looked on eBay and BAM, there it was. And so, he sent the vendor a message.
Viseu replied, saying how dreadfully sorry he was and that the camera would be returned at the airport.
How did it end?
Well, Viseu was promptly arrested and ordered to pay compensation of £145 and carry out 100 hours of community service. Oh, and now he’s on the internet known as a snide.
A spokesman for Essex Police said: “We arrested a 34-year-old man from the Stansted area on Friday February 20 on suspicion of theft. He was taken to Stansted area police station where he was interviewed and subsequently charged with theft of a camera and a Kindle.”
What do Ryanair think of it all? They said: “While we don’t comment on legal matters, we can confirm that this individual no longer works for Ryanair.”
A report from the National Fraud Intelligence Bureau has fired off a warning to you sun-worshippers, saying that some holidaymakers who have booked vacations online have been collectively conned out of £2.2m in 2014.
Crims have been targeting online booking firms to swipe money from unsuspecting folk, and many of those only find out that they’ve been had once they arrive at their hotel, who tell them that there’s no record of their booking.
The NFIB report shows, during a 12-month period, that 1,569 cases of holiday booking fraud were reported to the police’s fraud squad, with most complaints relating to plane tickets, hacking accounts, posting fake adverts online and setting-up bogus sites. Two groups particularly targeted were sports fans and religious groups, paying for fake tickets to religious sites and/or sporting events, where places are limited and people can charge more.
Mark Tanzer, ABTA chief executive, said: “Holiday fraud is a particularly distressing form of fraud as the loss to the victim is not just financial but it can also have a high emotional impact. Many victims are unable to get away on a long-awaited holiday or visit to loved ones and the financial loss is accompanied by a personal loss.”
“We would also encourage anyone who has been the victim of a travel-related fraud to report it so that the police can build up a case, catch the perpetrators and prevent other unsuspecting people from falling victim.”
Another day, another attack on people using gadgets to get on the internet. This time, something called Freak Attack (which sounds like an ace ’80s horror b-movie) is causing a headache for users of Android and Apple devices.
The good news is that there are no reports of this weakness being exploited (yet) and that the relevant companies are working quickly to shore up the flaw… but where has all this come from? Well, researchers reckon that the problem comes from code that came about from old government policies which required software developers to use weaker security in encryption programmes, thanks to that old chestnut of ‘international security concerns’.
The flaw is to do with web encryption technology, which could potentially enable bad people to spy on what you’re doing if you use Safari or Google’s Android browser.
Around a third of all encrypted sites were vulnerable as of yesterday, as sites continued to accept this weaker software, which affects Apple’s browsers, the Android browser, but not Google Chrome browser or the latest versions from Firefox or Microsoft.
Apple and Google have both said that they’ve fixed the Freak Attack flaw, with Apple rolling theirs out next week and Google saying that they’ve sent out the goods to device makers and wireless carriers.
Obviously, this highlights the problems with governments interfering with encryption codes, even when dealing with national security. This old policy has come back to bite it on the arse, as it could well do the opposite of what it was intended to do, and actually give a helping hand to criminals.
Until a rollout occurs, you’d be wise to use Chrome, Firefox or Microsoft’s browser or, indeed, ride your luck until the new security measures are in place, if you’re feeling saucy.