Author Archives: Jovi Umawing
“Internet Shut-Down” in T-Minus One Day
Today is still Sunday for most of us, which is a good thing, for tomorrow (July 9) is a day that will be unlike any other day for some Internet users. DNS Changer, a class of malware designed to alter …
Pinterest Spam Bank on “Independence Day”
Guess what got dropped into inboxes while everyone is eager to watch some fireworks. click to enlarge Yes. That. From: {possibly random sender} Subject: Independence Day Message body: Pinterest Hi! With millions of new pins added every week, we congratulate …
Boxer SMS Scam Poses as Firefox for Android
One of our security researchers in the AV Labs spotted an Android application posing as the popular Web browser Firefox and is hosted on several Russian websites (Note that these sites are still up and running as of this writing). The …
Worm Found in Peru Systems was Stealing Data
Our colleagues at ESET discovered a worm malware that was propagating within computer systems in Peru, its neighbouring countries, and some parts of Asia. Their target? AutoCAD drawing files (.dwg). AutoCAD is a computer software generally used by engineers and …
Why Some Fall for Nigerian Scams and Some Don’t
Last Wednesday, Microsoft released a white paper that not only brought back old memories of 419 spam (also known as Nigerian spam) posts I wrote years ago but also made me ponder on the question the paper poses on its very …
Analyzing Flame with Sandbox Technology: Webinar Now Online
GFI Software has successfully concluded the free webinar, Analyzing Flame. Nicholas Keuning and Anthony Arrington presented results of their findings and analysis of Flame, the latest advanced threat next to Stuxnet, using only sandboxing technology. The aforementioned researchers mimicked the environment …
Free Webinar: “Analyzing Flame”
On June 19, Tuesday, 2PM (ET), threat researchers from GFI Software, Inc. will be conducting a webinar to demonstrate how sandbox technology can assist cyber-security professionals in defending their networks from Flame. Click here to register. For more details, please refer to …
Fake Twitter Confirmation Email Points to Blackhole Exploit
Yesterday, we wrote about the return of Amazon spam, and how criminals behind this campaign led users to have their software exploited via the Blackhole exploit kit, especially if they’re not properly patched. At the end of that entry, we included …
Amazon Spam is Back, Blackhole Exploit in Tow
Recently, we’ve seen an Amazon spam in the wild that looks like this: click to enlarge The sender’s name was deliberately called “Amazon.com” to make the spam appear legitimate. What gives away this particular spam, however, is that this sends to …
VIPRE® Report for May: Scammers Aim Crosshairs at Tumblr Users
In the April VIPRE Report, we had reminded readers of this blog that online social networking threats are no longer limited within the Twitter and Facebook environments. In May, we found and wrote about a number of spam and phishing …










