ALL >> Computers >> View Article
Security Experts Alert Users On Royal Scam
While the world turns its eye on the Royal wedding, scammers are trying to attract attention of Internet users. The Royal wedding of Prince William and Miss Catherine Middleton has provided another opportunity for cybercriminals to defraud Internet users. Attackers are using various social engineering and optimization techniques to extract sensitive personal and financial information. Security researchers at Kaspersky Lab have identified SEO optimized Google image searchers that lead users to malicious websites. Internet users are likely to search for pictures, images and videos related to the Royal wedding. Attackers are trying to take advantage of this tendency of users by enticing them to visit malicious web pages. One of the malicious sites uses exploit for Help Center URL validation vulnerability in Windows XP and Windows 2003 to insert malware in vulnerable computer systems. Kaspersky has detected the malware as Heur.Trojan.Win32 and is designed to steal passwords. The exploit may also breach security of Firefox and Opera to install a malicious PDF file. Attackers are also trying to benefit from the event by installing ...
... a Rogue anti-virus solution, which blocks Internet access and seeks payment for activation. In this case, users are redirected to a .cc domain malicious site.
Security researches at Sophos have cautioned against revealing information such as mother's maiden name, name of first pet, grandparent name and street name on social networking sites. They have detected a harmless message, currently in circulation among Facebook users. The message asks users to post a Royal wedding guest name on their Facebook profile. The name should begin with Lord or Lady, grandparent name as the first name, name of the first pet as last name, double-barreled with a street name. Security researchers warn that such information may be misused by cybercriminals to conduct identity theft as similar names are asked by websites for 'secret answer', to confirm user's identity, when they forget their passwords.
Internet users must be wary of disclosing real names associated with the security of their accounts, for themes such as Royal wedding guest names to prevent identity theft. Users may update themselves on latest threats by following security blogs, advisories, security alerts, e-tutorials and online degree courses on cyber security. Internet users must use latest patched browsers, avoid clicking on suspicious links and update anti-virus solutions regularly.
Employees must adhere to all cyber security tips, while accessing Internet in their organizations to prevent inadvertent installation of malware, which could extract privileged business information. Organizations may encourage employees to undertake online university degree courses on information security.
Hiring professionals qualified in masters of security science may help in identifying and implementing necessary security mechanisms, applying requisite patches and creating security conscious culture in the organization.
Add Comment
Computers Articles
1. Martindale Law Firm Competitive Analysis Data For Legal IndustryAuthor: Den Rediant
2. The Impact Of Digital Transformation In Clinical Trials
Author: Giselle Bates
3. Blending Art, Technology, And Access: A Look At Pure Art Sketch Community And Digital Portals
Author: new aurthors
4. Full Stack Development Company Driving Mvp Success Fast
Author: Rob Stephen
5. You May Need It Consulting Services But You Are Not Aware Of It Yet
Author: Helen Johns
6. Top Pos Dealers Solutions In 2025 | Best Pos Dealers In Hyderabad
Author: pbs
7. Newegg Product Data Scraping For E-commerce Market Intelligence
Author: Den Rediant
8. Coles & Woolworths Pricing Data Scraping For Retail Strategy
Author: Den Rediant
9. Answering_services
Author: brainbell10
10. Api_security
Author: brainbell10
11. Appium
Author: brainbell10
12. Out-of-stock Prediction Using Web Scraping For Inventory Management
Author: Den Rediant
13. Restaurant Data Scraping Api To Monitor Competitors In Real Time
Author: Den Rediant
14. Adobe_xd
Author: brainbell
15. Amazon Sagemaker Services
Author: brainbell10






