phishing

Hackers transform EA Web page into Apple ID phishing scheme

Using some trickery, hackers were able to breach Electronic Arts' Web site and transform one of its pages into a bogus Apple log-in screen. Once users logged on to the fake site, they were prompted to input their credit card numbers, date of birth, and other personal information.

Security firm Netcraft discovered the breach and notified EA on Tuesday. The game maker told CNET that it investigated Netcraft's claims and as of Wednesday the phishing page is gone.

"We have found it, we have isolated it, and we are making sure such attempts are no longer possible," … Read more

Spot a phishing e-mail in 2014

You almost got me, you crafty little phisherman.

The subject line of the e-mail referenced "your Apple ID." The body mentioned my credit card and how it had just been "updated." A quick scan of the rest caused momentary alarm. My credit card? I didn't make any changes to my credit card or my Apple account.

Then my morning coffee -- and common sense -- kicked in. Upon closer inspection, I recognized this e-mail for what it was: an attempt to infiltrate my computer and steal some personal information. In other words, a hacker doing … Read more

Criminals pilfer ATMs with malware infected USB drives

Robbing ATMs is nothing new. There's the everlasting stick-em-up, the bogus card scheme, ATM phishing, and more. But, it appears new ways are being invented to pull off successful cash machine heists.

It was recently revealed that thieves were able to access loads of ATM money by injecting machines with malware using USB drives, according to the BBC.

These break-ins involved both low- and high-tech techniques. Apparently, the criminals manually cut holes in the machines to plug in USB sticks that then installed malware on the system. Once the machines were infected, the robbers would patch the holes on … Read more

Crackdown successfully reduces spam

Efforts to put an end to e-mail phishing scams are working, thanks to the development of e-mail authentication standards, according to a pair of Google security researchers.

Internet industry and standards groups have been working since 2004 to get e-mail providers to use authentication to put a halt to e-mail address impersonation. The challenge was both in creating the standards that the e-mail's sending and receiving domains would use, and getting domains to use them.

Elie Bursztein, Google's anti-abuse research lead, and Vijay Eranti, Gmail's anti-abuse technical lead, wrote that these standards -- called DomainKey Identified Email (… Read more

Review: McAfee LiveSafe 2014

Pros

Feature-packed: LiveSafe is a hefty 170MB, but that's no surprise, given its many features. These include antivirus, spyware, and home-network protection, as well as a built-in firewall. Cross-device protection is available for both Android and iOS.

Beyond malware: McAfee has also packed in storage and management tools, including a password manager, a device-management console, and protective measures against phishing attacks.

Multiplatform: Once installed properly, SafeKey works across browsers, provided you have the extension installed.

Cons

Fragmentation: McAfee offers separate services and experiences without many breadcrumbs to inform users of other services' existence. Device management could have been integrated … Read more

Review: Secure your PC with Norton 360's all-around protection

Norton 360 is the top of Symantec's new line of premium anti-virus tools. Like its stablemates, Norton 360 offers real-time protection from a host of existing and emerging threats, including viruses, malware, phishing, corrupt downloads, and online scams. It protects your e-mail, social media sites, mobile devices, Cloud-based resources, and even your family. And Norton 360 also includes 24/7 technical support as part of its subscription price -- something free anti-virus tools can't match. You can install Norton 360 on three separate PCs, too, so it can protect your home network or other family members' computers (with … Read more

Review: Protect your home or family network with Norton Internet Security 2014

Norton Internet Security 2014 sits in the middle of Symantec's new line of premium anti-virus tools. It has the same comprehensive, real-time protection from viruses, malware, identity theft, and online scams as Norton AntiVirus, as well as 24/7 support, online software management, deep cleaning and repair, and a streamlined interface. Internet Security 2014 adds system performance tools, parental controls, an intelligent two-way firewall, and more. But it really earns its keep by protecting up to three PCs, making it a great choice for a family network or users with more than one computer.

Installing Norton Internet Security 2014 … Read more

Phishing scam piggybacks on Apple Dev Center hack

The recent attack against Apple's Web site for developers has prompted a flood of phishing e-mails asking people to change their passwords.

Users have taken to Twitter to warn others of the attacks. But as convincing as the e-mail might be at a glance, grammar mistakes, a missing capital letter in "Apple," and a fake Apple domain for the Web site the e-mail points to mark the message and the site as bogus.

Still, scammers often use emotional responses to a recent event to induce panic in users -- which may make them less likely to double-check … Read more

Google uncovers phishing campaign targeting Iranians

Google has detected what appears to be a spike in politically-motivated phishing attacks targeting Gmail accounts belonging to thousands of Iranians just days before a presidential election in the country.

The Web giant identified a "significant jump in the overall volume of phishing activity in the region" in the past three weeks originating from within the country. Eric Grosse, Google's vice president of security engineering, noted in a company blog post Wednesday that "timing and targeting of the campaigns" suggested political motivation ahead of Friday's elections.

Grosse explained how the campaign operated:

Our Chrome … Read more

Chinese hackers reportedly stole Obama and McCain documents

On the eve of President Barack Obama's high-level meeting with Chinese President Xi Jinping, U.S. intelligence officials have revealed that a slew of documents and e-mails were stolen during the 2008 presidential campaign from both the president and then GOP presidential candidate John McCain. Officials are accusing China's government for the hack.

According to NBC News, officials said that they first detected the major cyberattack in the summer of 2008 and were then able to trace the culprits back to China.

"Based on everything I know, this was a case of political cyberespionage by the Chinese … Read more