Cybercriminals employ different but complementary techniques when it comes to propagating FAKEAV. Ultimately, however, their goal is to entice users to click malicious links that led to the download of different FAKEAV variants.
Category: Computer Security
Researchers at Google are revealing their analysis of rogue antivirus operations they studied during a 13-month period at an upcoming security conference. According to their findings, rogue AV is behind 60 percent of the malware on domains that include Google trend keywords.
New research from Google underscores the breadth of fake antivirus operations on the Web.
An analysis of 240 million Web pages collected by Google’s malware detection infrastructure over a 13-month period discovered more than 11,000 domains involved in the distribution of rogue antivirus (AV). While that may be a small overall percentage, Google’s research found that fake AV accounts for 60 percent of the malware discovered on domains that include trending keywords.
more…
http://www.eweek.com/c/a/Security/Google-to-Reveal-Research-into-Fake-AV-Operations-757492/
Hashtags.org is for sale, along with this account. Email superphly@gmail.com if you are interested in making an offer. #whatcouldhavebeen
TweetGrid is a powerful Twitter Search Dashboard that allows you to search for up to 9 different topics, events, converstations, hashtags, phrases, people, groups, etc in real-time. As new tweets are created, they are automatically updated in the grid. No need to refresh the page!
This is a very useful utility!
On Thursday, MIT students built an upside-down room at the Wiesner building on Ames Street in Cambridge, according to the Cambridge Chronicle. The students furnished the room with a pool table, framed painting, and leather seats.
This may be the most recent stunt by MIT’s student body, but it’s far from the first. Scroll through this gallery for a timeline of past MIT hacks.
A Bank of America worker pleaded guilty Tuesday to installing malware on more than 100 ATMs, and stealing $304,000 over a seven-month period.
Authorities were able to recover at least $167,000 in cash after the worker told U.S. Secret Service agents where they could find the money, according to a press release issued by the U.S. Attorney’s office in North Carolina, where the charges were filed.
Rodney Reed Caverly, 53, pleaded guilty to one count of unauthorized computer access for installing the malware.
Caverly’s attorney told Threat Level that his client wrote the code himself. It instructed the ATMs to dispense cash without creating a record of the transactions.
“I have seen some media speculation that this event is somehow related to an Eastern European computer virus from last year,” defense attorney Christopher Fialko said in an e-mail. “It is not.”
Fialko was referring to a Threat Level report that suggested Caverly’s code might have been related to malware found last year on ATMs in Russia and Ukraine, which also instructed the machines to dispense cash without leaving a record.
According to prosecutors, Caverly withdrew the cash over a seven-month period ending in October 2009. A Bank of America representative told Threat Level that the company discovered the theft internally.
A source familiar with the case said that Caverly specifically targeted at least 100 ATMs with his malware.
Caverly began working for Bank of America in 2007 writing application software and troubleshooting programs.
He was formerly the founder and CEO of Sovidian, a North Carolina software development company established in 1999. The company merged in April 2003 with Data On CD, a document-management and archiving firm. According to a news release on Sovidian’s website announcing the merger, the company has provided “tailored software and software integration solutions for the finance industry for over 10 years,” and counted Bank of America and two other major financial institutions as customers.
Caverly is out of jail on a $25,000 bond until his sentencing hearing later this summer. He faces up to five years in prison and a maximum fine of $250,000.
Photo: James Merithew for Wired.com
- Twitcam posts your video description and link to Twitter for all your followers to see.
- While broadcasting, chat with your viewers via Twitter right from your broadcast page.
- Once you’re done going live, we archive your video and display it on the same page
more…
About
Welcome to FakeMemorySentinel.
Our site is a member of the FrankenFlash Project. Unlike SOSFakeFlash we do not wait confirmation before issuing a warning on the internet.
In January 2010, after two years of investigation the project released:
Draw your own conclusions.
Since August 2008, SOSFakeFlash has battled fraudulent eBay flash memory sellers. The project estimates less then 1 in 10,000 fake flash memory items is pursued with a dispute – a PayPal claim. According to SOSFakeFlash, buyers find out too late.
Fake flash memory sellers adapt their tactics.
The cycle is endless. By early February 2010, SOSFakeFlash documented over 900+ eBay sellers.
The rules imposed on SOSFakeFlash, while providing solid reputation and credentials is working against victims of fake flash memory. These rules are exploited by fraudulent sellers who are delaying shipments, use multiple item listings, private auctions, email tennis, renaming eBay id’s, using counterfeit rings (multiple eBay id’s), opening new ids to continue when suspended, dump and run (deregistering) – every tactic possible to use the short claim window eBay members have.
The project has formed a new group, the most seasoned fake flash memory hunters with access to SOSFakeFlash’s databases. The objective? Rapid response. The group? FakeMemorySentinel.
more…
500GB Sony MicroVault Counterfeit Fake USB Flash Drive – Model Numbers USM4024 – USM500024
Posted by flashchiptutor on March 26, 2009
Beware Sony Microvault models USM4024, USM500024 advertised as 500GB with a packaging label of 500G are a counterfeit – fake! Sony never produced these usb flash drives. It will be a number of years before there will be a 500GB usb flash drive available. These are the most outrageous and wild false capacity usb flash drives. Sold on wholesaler internet sites in China and Hong Kong. Often sold as “upgraded” – there is no such thing. These drives are unlikely to have a real capacity of more than 512MB. This model type the favorite Sony Micro vault counterfeit sold on eBay. It comes in other sizes and packaging. Avoid being frauded or scammed. Do not buy this usb flash drive, you risk data loss. Do not sell this usb flash drive!
more…
500GB Sony MicroVault Counterfeit Fake USB Flash Drive – Model Numbers USM4024 – USM500024
Welcome to backtrack-linux.org, the highest rated and acclaimed Linux security distribution to date. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you’re making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester.