Scam as a service 2: the B team

Interest in Tor based threats is increasing to the extent that some vendors will scoop up all activity they find on Tor and provide you a nice front end to search through it at your leisure. This might lead the casual observer to assume that the darkness is a one stop shop for cyber threats, but criminals existed on the internet prior to Tor, and still do quite well for themselves without it. In fact, bad guys with good OPSEC tend to be the exception, rather than the rule. So let’s take a quick look at some unpleasant stuff and the nadir of bad OPSEC, Facebook.

Categories:

Tags:

(Read more…)

Read more

Mobile menace monday: safe practices with your mobile device

‘Tis the season for gift giving, and who wouldn’t be excited about receiving a brand new mobile device! Before you start loading your new device with various apps, we shared in this post several safe practices to make sure your holidays stay malware-free.

Categories:

Tags:

(Read more…)

Read more

More phishy sponsored tweets

Watch out: sponsored Tweets leading to phishing pages are doing the rounds once more. We take a look at the latest phishing scam being pushed to unsuspecting Twitter users, and show how the scammers are after a double-whammy of login credentials and credit card information.

Categories:

Tags:

(Read more…)

Read more

Clickjacking campaign abuses Google Adsense, avoids ad fraud bots

Ad fraud is a billion dollar problem for advertisers. When real users are tricked into clicking on ads they can’t even see, (almost) everyone loses.

Categories:

Tags:

(Read more…)

Read more