Biometric Security is being billed as the next savior of personal and corporate security, a superior solution to our Identity and Access management problems. However, the fact is that if someone steals your Biometric ID, it remains stolen for life.
Continue ReadingCategory: Security
Analysis of Spam Thru botnet
Mark Sunner, Chief Security Analyst at MessageLabs was among the many security analysts watching one Trojan called “Spam Thru”, a piece of malware designed to send spam from an infected computer, at the turn of last year. Spam Thru represented an expontential jump in the level of sophistication and complexity of these botnets, harnessing a 70,000 […]
Continue ReadingNigerian Scammer moves to London, England
The most visible form of fee fraud today is the Nigerian Letter or 419 fraud. A typical letter claims to come from a person needing to transfer large sums of money out of the country or from a lottery company. As the Nigerian letter has become well known to potential targets, the gangs operating the […]
Continue ReadingSpammers now using TinyURL to flood comments
Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages. While the most widely recognized form of spam is email spam, spam in blogs is becomming huge these days along with search engine spam and mobile phone messaging spam. Spamming is economically viable because advertisers have no operating costs beyond the management […]
Continue ReadingWhat a Paypal phishing email looks like and how to detect it
In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an electronic communication. Phishing is typically carried out using email or an instant message, although phone contact has been used as […]
Continue Reading