Remove Accountability Remove Computers and Electronics Remove Information Security Remove Internet
article thumbnail

“Beyond the border scam”, pay attention to the instance of the new Nigerian fraud

Security Affairs

Following up on the electronic letter, the alleged widow begins a copious correspondence in which she says she was left completely alone after the death of her husband and children and without a home or money and hosted in a border refugee camp, where she feeds herself.

Scams 106
article thumbnail

Russia-linked APT28 used new malware in a recent phishing campaign

Security Affairs

The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new cyber espionage campaign carried out by the Russia-linked group APT28 (aka “ Forest Blizzard ”, “ Fancybear ” or “ Strontium ”). Thus, the compromise of any computer can pose a threat to the entire network.” ” reads the advisory published by CERT-UA.

Phishing 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Estonian hacker Pavel Tsurkan pleads guilty for operating a proxy botnet.

Security Affairs

Estonian hacker Pavel Tsurkan has pleaded guilty in a United States court to the counts of computer fraud and of creating and operating a proxy botnet. The Estonian national Pavel Tsurkan has pleaded guilty in a United States court to two counts of computer fraud and abuse. ” reads the press release published by DoJ. . .

article thumbnail

US DoJ announced to have shut down the Russian RSOCKS Botnet

Security Affairs

The RSOCKS was composed of millions of compromised computers and other electronic devices around the world, including industrial control systems, time clocks, routers, audio/video streaming devices, and smart garage door openers. “The U.S. ” reads the announcement published by DoJ. 1 day, 1 week, or one month).

article thumbnail

Snowden Ten Years Later

Schneier on Security

I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem. So would the FBI breaking into my home and seizing my personal electronics. I tried to talk to Greenwald about his own operational security.

article thumbnail

Microsoft sued North Korea-linked Thallium group

Security Affairs

Microsoft sued Thallium North Korea-linked APT for hacking into its customers’ accounts and networks via spear-phishing attacks. Microsoft sued a North Korea-linked cyber espionage group tracked as Thallium for hacking into its customers’ accounts and networks via spear-phishing attacks. 27 in the U.S.

article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware. How did the contagion stop?

Malware 98