Category Archives: Malware

Fame At Last, Or Under Attack?

Here’s an example of how social engineering can be more important than technical sophistication. It’s an email with a credible from address, credible header, credible subject line, credible contents: From: john@flexiprint.co.uk Subject: Photo Approval Needed Hello, Your photograph was forwarded to us as part of an article we are publishing for our May edition of… Read More »

Estonia Nets A Big Phish

The Register, quoting AP, says that an Estonian man suspected of plundering millions from hundreds of online bank accounts accounts across Europe was arrested last week. AP reports that the unnamed 24 year-old allegedly used a sophisticated Trojan in order to monitor the keystrokes on victims’ PCs and extract confidential banking passwords that allowed him… Read More »

A New Way To Foil Keyloggers?

PC Tools has released a new version of Spyware Doctor, 3.2, with what it calls “groundbreaking Keylogger Guard technology that protects users from identity thieves”. A press release says: Existing solutions can allow keylogger threats to run undetected for weeks or months by which time the damage is already done. Spyware Doctor 3.2’s Keylogger Guard detects… Read More »

How To Get Infected

What does it take to create a chain of infection? Perhaps just one credible link. Last night I came back to my computer to see a an IM message from Josh Rowe, an Australian contact who is active in the anti-spam world Down Under. You couldn’t find a more diligent, experienced and responsible person, so… Read More »