Browsed by
Category: News

Phishing methods

Phishing methods

Phishing methods have become extremely popular, which makes it difficult for the average person to verify the degree of danger. By opening an email or website, they are not able to distinguish it from fake ones. This favors extortion on a large scale and is profitable for criminals. Often, fake emails and websites contain real-world logos from well-known companies, which makes them look very credible.

https://isc.sans.edu/diary/Phishing+with+a+self-contained+credentials-stealing+webpage/25580

Holiday season can be a real harvest for cybercriminals

Holiday season can be a real harvest for cybercriminals

Every year, the percentage of customers deceived online increases. The holiday season can be a real harvest for cybercriminals. Web users should carefully check the text of suspicious e-mails, grammar, style or twisted words. The warning light should also light up if the sender asks us to provide personal or bank details, or even to make a transfer to an account.

https://www.helpnetsecurity.com/2019/12/06/online-retail-fraud-increase/

The Russian digital service provider Rostelecom

The Russian digital service provider Rostelecom

The Russian digital service provider Rostelecom has offered telecom operators quite a specific solution to the problem associated with hackers – honeypots. Considered is the creation of special software that is supposed to simulate the attack and detection of hackers trying to hack a server. Rostelecom experts are very confident in their solutions and say that it will also be possible to collect information on new hacking methods.

https://www.ehackingnews.com/2019/12/rostelecom-cyber-security-honeypot-hackers.html

Mozilla removed 4 Avast and AVG extensions

Mozilla removed 4 Avast and AVG extensions

Today we won’t find Avast and AVG extensions in search results, they just stopped working and links to them. Avast Online Security, AVG Online Security and two versions of SafePrice have also disappeared. In general, the data is not necessary for the operation of extensions, but it is very well suited for identifying Internet users and profiling ads.

https://securityaffairs.co/wordpress/94703/digital-id/mozilla-avast-avg-extensions-removed.html

DNS

DNS

One of the main plagues of modern data processing is malicious software. Suppliers spend a lot of time to block access of malicious files on the Internet. A simple way would be to completely disconnect from downloading malware and hosting servers. Knowing which sites are bad would be enough to prohibit users from connecting to them. It would be a way out, but as usual, it has its pros and cons.

https://www.helpnetsecurity.com/2019/12/04/how-dns-filtering-works/