Protecting over 200 million PCs, Macs, & Mobiles – more than any other antivirus

Archive

Posts Tagged ‘social engineering’
February 27th, 2014

Sex, lies and videotapes aka Celebrity scams

Famous people – movie stars, athletes, politicians -  are the favorite subject matter of scammers. Using modern technologies and communications channels, scammers and social engineers come up with sophisticated methods to trick people and grab their attention. Social channels offer a perfect environment to create buzz, grab users’ interest with shocking content, and eventually make people share the scams themselves! Behind different types of scams stands different motivations; collecting likes (likes farms), spreading malware, or installing malicious applications that will steal your credentials. Whatever  those motivations, the intentions of scammers ain’t for your benefit!

We monitor social media to pick up those dangerous scams, warn our community, and report it to our virus lab. There are plenty of users who still become victims of scammers. We are convinced that it is more efficient to avoid problems, than to fix them.

An ounce of prevention is worth a pound of cure ~ Benjamin Franklin

Let’s take a look at a few types of scams and patterns that will help us to recognize them ahead. STOP – THINK – AND DON’T CLICK (YET)

Celebrity_sex_scam“Sex tape” scam 

Celebrities are in the constant spotlight, followed not only by the paparazzi and tabloid magazines, but fans as well, observing every step they take. The more unusual and shocking the story is, the better it sells online. Is there any better way to attract humans’ attention than with sex? If you know of some, please let us know! :) Meanwhile, let’s learn how those scams work and mainly -  how to recognize them!

Red flags:

  • Rouge visuals, shocking copy, and very strong call to actions. If the status contains any of following: OMGYou must watch itLook what she/he has done! NEVER click on this link!
  • Message leads to a shortened URL, so you can not recognize the link that doesn’t lead to any well- known source (celebrity fan pages or blogs, entertainment websites)
  • The hosting server is unknown source

Would you click on the video saying “OMG I can’t believe Rihanna did it with a…” Read more…

September 10th, 2013

Congrats! Your Mobile Number was selected as a winner of £2,000,000.00!

Yes! What a lucky day! I’ve just got a message that I won 2,000,000.00 British Pounds (2.4M EUR/3.1M USD), an Apple laptop, a T-shirt, and a cap emblazoned with a logo of The Free Lotto Company.  Pretty awesome you might think, but appearances are deceptive. Unfortunately, this is just one of the ways bad guys try to get some of our money.

Well, I was thinking, it‘s worth a shot. So I decided to write to the email address and see what would happen. Actually, the hardest part was a making up a fake name for myself! You would never believe how rough this might be. In the end, I decided to call myself Robert Konmed.

smstextUSED

Here’s how the conversation went down.

Me: Hello, I’ve got a winning message with information to contact your email address. How can I pick up my prize please? Thank you, Robert Konmed

Bad guys: Please find attached document for info to contact courier delivery company:  EMAIL:rdsdeliveryservices@hotmail.co.uk Regards Brian Calton

textWinningcertifita

Me: Hello guys, I’m really excited about a winning prize. But would be possible to tell me how much I should prepare for a delivery company? And also I’m curious if there is possibility to charge delivery from my winning prize? Thank you & have a nice day! Best regards! Robert Konmed Read more…

March 19th, 2010

In the cloud identity – can we protect it?

Last few years can be called a “social networking era”. Just remember the rise ups (and depressions) of myspace.com, linked.in etc. These networks are now completely shadowed by FaceBook and Twitter. Even when myspace and similar networks are not that widespread today, they were at the beginning of all. It becomes more and more usual to identify a real ego with social network profile. That’s not too dangerous in its basis, but there’s a big problem – people completely loose a sense for their privacy on internet. This is not an attitude against social networks, it’s only a thought about dangerous habits appearing with the social networking phenomenon. The risk is not the existence of social networks, the risk is how people behave there.

Read more…