Choose from 3 security subscriptions to ensure the right level of protection.
Within the last several months, the FBI has seen a significant increase in fraud involving the exploitation of valid online banking credentials belonging to small and medium sized businesses. In a typical scenario, the attack vector is a "spear phishing" e-mail which contains either an infected file or a link to an infectious Web site. The e-mail recipient is generally a person within a company who can initiate funds transfers on behalf of the business, or a credential account holder (treasury management platforms typically support both wires and Automated Clearing House (ACH) transfers). Once the user opens the attachment, or navigates to the Web site, malware is installed on the user's computer. The malware contains a key logger, which harvests the user’s corporate online banking credentials. Shortly thereafter, the subject either creates another user account from the stolen credentials or directly initiates a funds transfer masquerading as a legitimate user. These transfers have occurred through both the wire system and the ACH Network; however, this bulletin specifically addresses incidents that have occurred through the ACH Network. In one case, the subjects used a Distributed Denial of Service (DDoS) attack against a compromised ACH third-party provider to prevent the provider and the bank from recalling the fraudulent ACH transfers before money mules could cash them out. These ACH transfers ranged from thousands to millions of dollars.
Below is an example of a landing page where receivers of "spear phishing" e-mails were taken after clicking the embedded link within the e-mail. Spear phishing is a phishing attack that targets select groups of people with something in common-they work at the same company, bank at the same financial institution, attend the same college, order merchandise from the same website, etc. The emails are ostensibly sent from organizations or individuals the potential victims would normally get emails from, making them even more deceptive.
Het Australische High Tech Crime Centre wil het gebruik van firewall en anti-virus voor consumenten verplicht stellen en anders mogen ze het web niet op. Abonnees van internetproviders moeten een contract ondertekenen waarin staat dat hun computer met beveiligingssoftware is beveiligd en over een recente browser en gepatcht.
NSS Labs warns companies for the virus scanners by Panda Security and AVG, they should not use these virus scanners according to NSS Labs. They performed a test monitoring how fast virus scanners block malicious websites. Especially Panda Security required a lot of time to accomplish this. The average time for a virus scanner to block such a website is 45 hours, however the Spaniards needed 90 hours to do so. AVG managed to do so in 71 hours. The best virus scanner required 5 hours. They also looked at the 'block rate', they speed of blocking a malicious website. The best virus scanner blocked only 60%, but AVG, Panda and Eset scored less than 44%.
The tests by NSS Labs are according to sum controversial and the research is downloadable at the fee of 500 dollar.
The Australian High Tech Crime Centre wants to oblige consumers to install and use a firewall and antivirus. With the consequence that if they won't use a firewall and antivirus they will not be allowed to use the Internet. Subscribers and Internet providers have to sign a contract what states that their computer is secured with security software.
Most malware is disabled within two hours, but this is often enough time for the malware to successfully infect systems. In 2007 the average life time of malware was seven hours, a year later this was reduced to five hours. Next to renewing te malware to avoid detection by virus scanners, the cyber criminals are also renewing the websites where the malware is being sent from. Security software is not succeeding to control the threat, says a security rapport by Blue Coat.
Most malware is found on websites for online storage, software downloads, pornographic content, mixed content and hackingsites. There are lots of porn sites that are only there to distribute malware, according to the security company.
The rapport also showed that fake virus scanners and fake video codec's are the most successfull threats on the Internet in 2009. In case of the video codec's it is often porn what is being used, two third of the fake codec's promises to show the visitor pornographic content.