Author Archives: PC Tools

When you have to adjust to limiting your prose to a maximum 140 characters, each letter, number, and symbol takes on more significance, and oftentimes many of these characters comprise a link’s lengthy URI. Uniform Resource Identifiers (often identified as … Continue reading

Posted in Online Fraud | Tagged , , | Leave a comment

Over the past 10 years, cybercrime has been thrust into the government spotlight with new gusto. Although more attacks on government hardware have transpired than will ever be admitted, there are multiple public instances where other countries have bypassed US … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

How much is your identity worth, or at least a small portion of it? Your email username and password, particularly if you are one of many who use Google’s Gmail, are more valuable than you might think, but remain a … Continue reading

Posted in Privacy | Tagged , | Leave a comment

We saw the FakeAV groups brazenly modifying victim systems HOSTS files recently, attempting to fool users into thinking that they are visiting real/legitimate review sites. There’s a first for everything, and this time we are seeing the first worm specifically … Continue reading

Posted in Virus News | Tagged , , | Leave a comment

Albert Gonzalez was sentenced to 20 years in prison, the harshest punishment for a computer crime ever handed down in an American court. Yet, despite this small victory in the war on cybercrime, law enforcement officials still face major problems … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

We are all familiar with the stereotypical spam emails containing temptations along the lines of “Someone has a crush on you!” or “80% Discount on Viagra,” but how many of us would seriously ponder clicking on an included link? It’s … Continue reading

Posted in Spam | Tagged , | Leave a comment

Have you ever accepted a random friend request on Facebook? Maybe from someone who looks a little bit familiar but you can’t quite place, or someone who is a friend of a friend, or even just someone who looks potentially … Continue reading

Posted in Privacy | Tagged , | Leave a comment

In our current age of ubiquitous social networking, it is easy to get drawn into what our friends and acquaintances say, do, and post. As most people choose to share stories that they find interesting, we think nothing of clicking … Continue reading

Posted in Malware Alerts | Tagged , , | Leave a comment

A zero day attack refers to a hole in software that is unknown to the vendor. This security hole is exploited by hackers before the vendor becomes aware and races to fix it. Uses of zero day attacks can include … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

Any social interaction online can make someone the target of a predator looking to make a profit, and online gaming is no exception, despite the close-knit community of users. There are a number of ways to manipulate gamers, compromising both … Continue reading

Posted in Adware & Spyware | Tagged , | Leave a comment

Being unemployed is hard enough. Hours of job hunting and stressing over how to pay the bills can provide endless anxiety. Now there’s yet one more concern for desperate job seekers – the possibility of falling victim to the increasingly … Continue reading

Posted in Online Fraud | Tagged , , | Leave a comment

These days, it’s hard to go a day without reading news about Facebook and/or Twitter, most revolving around online security, privacy concerns, or the latest cyberattack. One site that seems to fly under the radar is LinkedIn, the social networking … Continue reading

Posted in Privacy | Tagged , , | Leave a comment

As we choose to reveal more and more personal information to others via blogs, social networks, and email, privacy concerns are of paramount importance. Although most of us simply don’t want our personal lives to intersect with our professional lives, … Continue reading

Posted in Privacy | Tagged , | 1 Comment

Domain names, the URLs you type into a browser to visit a particular website, are getting a new look as we move into 2010. What is good news for the international community, though, may bring a concomitant increase in the … Continue reading

Posted in Online Fraud | Tagged , , , , | Leave a comment

By Alan Lee – PC Tools Malware Research Team Next time when someone tells you, “Me and my wife watched this movie here : http://example.com/example”. Watch out, they may be luring you to a scam site! It’s the holiday season … Continue reading

Posted in Online Fraud | Tagged , , | 3 Comments

By Jonathan San Jose and Alan Lee Another Adobe 0 day vulnerability has been discovered on 28th October 2010. Version 10.1 of Adobe Flash and Version 9.x of Acrobat and Acrobat Reader are vulnerable to this attack. Exploits taking advantage … Continue reading

Posted in Malware Alerts | Tagged , , | Leave a comment

Cybercriminals: What Will They Think of Next? Cybercriminals are nothing if not entrepreneurial. One way that they can make money outside of their usual schemes is to sell Do-It-Yourself crime kits, fostering a new crop of hackers and earning a … Continue reading

Posted in Online Fraud | Tagged , | Leave a comment

By Crescencio Reyes – PC Tools Malware Research Division A new rogue antivirus was recently reported which is part of the fake Security Essential rogue malware. When the binary is executed, it will show a splash screen which is displayed … Continue reading

Posted in Malware Alerts | Tagged , | 2 Comments

As cybersecurity concerns increasingly become front-page news, there is a burgeoning effort to combat cyberattacks with the same defensive tactics employed in traditional warfare. There is, however, a novel complication—finding the attackers in the first place—but should security efforts concentrate … Continue reading

Posted in Hackers | Tagged , , , | Leave a comment

In the wake of Gmail cyber attacks by Chinese hackers, the prevalence of cybercrime has been thrust into the international spotlight. The question should be, though, why wasn’t it a hot topic before? Cybercrime encompasses any sort of crime having … Continue reading

Posted in Hackers | Tagged , , | 1 Comment

Author: Marianne Layador – PC Tools Malware Research Team Installation Method System Defragmenter is scam-ware that imitates a legitimate utility tool that will scan the system for hard drive and memory problems. It is installed through the typical method and … Continue reading

Posted in Malware Alerts | Tagged , , , , , | Leave a comment

Cybercrime is a growing problem in our technologically dependent society, costing the loss of hundreds of millions of dollars through scams and phishing schemes and exacting a heavy mental and emotional toll on those affected by instances of identity theft, … Continue reading

Posted in Hackers | Tagged , , | Leave a comment

The art world, no stranger to scandal, has seen its share of polarizing projects. The following theme, computer viruses as art, is a bit dated, as the oldest reference hails from 2001. Judging, however, from instances still occurring in late … Continue reading

Posted in Virus News | Tagged | Leave a comment

Combine the social nature of chat rooms with the whims of fate in Roulette and you have Chatroulette, the recent brainchild of 17-year old Andrew Ternovskiy. Tapping into the public’s love of novelty, exhibitionism, and quick fixes of entertainment, Chatroulette … Continue reading

Posted in Online Fraud | Tagged , | Leave a comment

Black hat hackers (or crackers, or sometimes just hackers if you don’t care to differentiate) are individuals with extensive computer knowledge whose purpose is to breach or bypass internet security. The general view is that, while hackers build things, black … Continue reading

Posted in Hackers | Tagged , | Leave a comment

Don’t let cybercriminals steal your hard-earned cash! Anyone with an email account is aware of the common dangers and general annoyance factor associated with spam emails, so we all know to avoid obvious tricks, such as messages touting extreme product … Continue reading

Posted in Spam | Tagged , , | 2 Comments

Earlier this week, we first posted our usual warning about the spike in Koobface threats that our ThreatFire users were seeing. That post set off some interest in the worm again. The last spike in the worm coincided with Dancho … Continue reading

Posted in Virus News | Tagged , , , | Leave a comment

By Steve Espino – PCTools Malware Research Team Windows Defence is a fake antivirus program that displays fake malware alerts on PCs in order to make unsuspecting users think that their computer has been infected by malware. Windows Defence is … Continue reading

Posted in Malware Alerts | Tagged , , , , , | 1 Comment

This post describes a technique that allows building a domain name generator for Murofet. The pseudo-random domain generators are not new – these were previously used by Sober, Kraken, or Conficker worms. The important thing about reproducing a particular domain … Continue reading

Posted in Malware Alerts | Leave a comment

Over the past several years, Russia and China have been considered the world’s top cybercrime capitals, but a new haven for hackers and spammers might surpass these criminal cyber-hotspots in the near future. Statistics show that cybercrime is growing at … Continue reading

Posted in Online Fraud | Tagged , | 1 Comment