ALL >> Computers >> View Article
Security Experts Alert Users On Royal Scam

While the world turns its eye on the Royal wedding, scammers are trying to attract attention of Internet users. The Royal wedding of Prince William and Miss Catherine Middleton has provided another opportunity for cybercriminals to defraud Internet users. Attackers are using various social engineering and optimization techniques to extract sensitive personal and financial information. Security researchers at Kaspersky Lab have identified SEO optimized Google image searchers that lead users to malicious websites. Internet users are likely to search for pictures, images and videos related to the Royal wedding. Attackers are trying to take advantage of this tendency of users by enticing them to visit malicious web pages. One of the malicious sites uses exploit for Help Center URL validation vulnerability in Windows XP and Windows 2003 to insert malware in vulnerable computer systems. Kaspersky has detected the malware as Heur.Trojan.Win32 and is designed to steal passwords. The exploit may also breach security of Firefox and Opera to install a malicious PDF file. Attackers are also trying to benefit from the event by installing ...
... a Rogue anti-virus solution, which blocks Internet access and seeks payment for activation. In this case, users are redirected to a .cc domain malicious site.
Security researches at Sophos have cautioned against revealing information such as mother's maiden name, name of first pet, grandparent name and street name on social networking sites. They have detected a harmless message, currently in circulation among Facebook users. The message asks users to post a Royal wedding guest name on their Facebook profile. The name should begin with Lord or Lady, grandparent name as the first name, name of the first pet as last name, double-barreled with a street name. Security researchers warn that such information may be misused by cybercriminals to conduct identity theft as similar names are asked by websites for 'secret answer', to confirm user's identity, when they forget their passwords.
Internet users must be wary of disclosing real names associated with the security of their accounts, for themes such as Royal wedding guest names to prevent identity theft. Users may update themselves on latest threats by following security blogs, advisories, security alerts, e-tutorials and online degree courses on cyber security. Internet users must use latest patched browsers, avoid clicking on suspicious links and update anti-virus solutions regularly.
Employees must adhere to all cyber security tips, while accessing Internet in their organizations to prevent inadvertent installation of malware, which could extract privileged business information. Organizations may encourage employees to undertake online university degree courses on information security.
Hiring professionals qualified in masters of security science may help in identifying and implementing necessary security mechanisms, applying requisite patches and creating security conscious culture in the organization.
Add Comment
Computers Articles
1. Scraping Dan Murphys Liquor Products Details DataAuthor: FoodDataScrape
2. Blue Wizard Liquid Drops 30 Ml 2 Bottles Price In Lahore
Author: bluewizard.pk
3. How Does Blockchain Resolve Data Privacy And Security Issues For Businesses?
Author: Severus Snape
4. Scrape Quick-commerce Data From Deliveroo Hop Uae
Author: FoodDataScrape
5. Web Scraping Quick-commerce Data From Noon Minutes Uae
Author: FoodDataScrape
6. Helical Insight: Best Open Source Data Visualization Tool In 2025
Author: Vhelical
7. Scrape Top Selling Grocery Product Data From Walmart Usa
Author: FoodDataScrape
8. Extract Quick Commerce Data From Flipkart Minutes
Author: FoodDataScrape
9. Refurbished Laptop Scams And How To Safely Buy A Trusted Device
Author: Sujtha
10. Web Scraping Freshco Supermarket Product Data In Canada
Author: FoodDataScrape
11. How To Compare Two Lists In Excel​: A Definitive Guide For Data Professionals
Author: blackjack
12. Monthly Updated Uber Eats Menu Dataset For 500k+ Restaurants
Author: FoodDataScrape
13. Extract Mcdonalds Store Locations Data In Usa For Competitiveness
Author: FoodDataScrape
14. Scrape Spicy Food Trend Data In Usa 2025 For Competitive Advantage
Author: FoodDataScrape
15. Why Startups Should Invest In Custom Software Development Service
Author: Albert