Just 24 hours after the world learned about the dangerously convincing Google Docs phishing scam
A very tricky phishing scam that takes advantage of Google Docs is making its way around the web. And since it uses a google.com URL and even makes use of Google’s SSL encryption, it’s almost impossible to tell that it’s a hack. Your best safeguard, as always, is a little bit of common sense.
If the screen below has ever popped up as you were supposedly logging into Netflix, we’ve got some bad news for you. No, it’s not your Netflix account—that’s perfectly safe (at least for now). But if you followed the instructions on the screen, you’ve been duped by a new phishing scheme that seems so painfully obvious, it’s almost brilliant.
At this point we pretty much all know what phishing emails look like and we’re resigned to the fact that we didn’t win the Micronesian lottery. We also know that we can’t buy a machine to instantly enlarge our sexual organs no matter how much personal information we provide. It was tough but we all came together in the mid-2000s and wised up.
Google’s Transparency Report has long warned us about the dangers of government overreach, but that’s not the only threat online — there’s plenty of malware to go around. Accordingly, Google is expanding its report to show the volumes of virus-infected and phishing sites found through the company’s Safe Browsing technology. The data includes both attacking and victim pages, and it shows how well web hosts cope with successful infections. Combined, the new information doesn’t paint a pretty picture. Google spotted a total of 67,909 compromised sites just in mid-June, and it still takes over a month for most affected webmasters to scrub their servers clean. The Safe Browsing data isn’t very reassuring, then, but it is a friendly reminder to be careful on the web.
Via: Google Online Security Blog
Source: Google Transparency Report
Phishing emails often pose as being sent by major league sites rather than princes from far-flung countries, but Twitter’s implemented a new measure to stamp out phonies that borrow its name. Costolo and Co. announced that, earlier this month, they began leveraging a tech called DMARC that establishes a way for email providers to authenticate senders and reject messages penned by impostors. While the DMARC specification does need support from e-mail services, outfits including AOL (which happens to be our parent company), Gmail, Hotmail / Outlook and Yahoo already make use of it. According to Twitter, it’s now “extremely unlikely” that the majority of their users will receive emails masquerading as being sent from a Twitter.com address. We’re sorry to disappoint, but it looks like you’ll have to get your fix of foreign lottery notices from somewhere else.
Filed under: Internet
Source: Twitter Blog
Today, the White House confirmed reports that one of its “unclassified networks” was the target of an unsuccessful cyber attack. Officials aren’t coughing up much more informaiton, but a few murmurs have seeped out. More »
For those of you who eat, live and breathe the Internet, do be aware that the next time your email inbox receives an email from privacy@microsoft.com, do not pass go, do not collect $200, do nothing other than delete that email. Chances are very high you would have then avoided the efforts of a phishing scam which was specially designed to steal Gmail, Yahoo, Windows Live and AOL passwords, at least this is what the good people over at Naked Security are saying.
Naked Security is a blog run by IT security firm Sophos, and they claim that the email entitled, “Microsoft Windows Update,” urges recipients to verify their email accounts through sending their personal login information. Quite a no-brainer when you think about it, but during momentary lapses of concentration, who can say what might happen, right?
Dear Windows User,
It has come to our attention that your Microsoft windows Installation records are out of date. Every Windows installation has to be tied to an email account for daily update.
This requires you to verify the Email Account. Failure to verify your records will result in account suspension. Click in the Verify button below and enter your login information on the following page to Confirm your records.
VERIFY
Thank you,
Microsoft Windows Team.
The above is what the email generally says, so you have been forewarned!
By Ubergizmo. Related articles: Xbox Live users target of phishing scam, Hotmail to roll out new features to combat spam and account hacking,
If you’re an iPhone owner, you may want to use good judgment before responding to any out-of-the-blue text messages in the near future. French jailbreak developer and security researcher pod2g finds that every iPhone firmware revision, even iOS 6 beta 4, is susceptible to a flaw that theoretically lets a ne’er-do-well spoof the reply address of outbound SMS messages. As Apple is using the reply-to address of a message’s User Data Header to identify the origin rather than the raw source, receiving iPhone owners risk being fooled by a phishing attack (or just a dishonest acquaintance) that poses as a contact or a company. A proof of concept messaging tool is coming to the iPhone soon, but pod2g is pushing for an official solution before the next iOS version is out the door. We’ve asked Apple for commentary and will get back if there’s an update. In the meantime, we wouldn’t panic — if the trickery hasn’t been a significant issue since 2007, there isn’t likely to be a sudden outbreak today.
Filed under: Cellphones
iPhone reportedly vulnerable to text message spoofing flaw originally appeared on Engadget on Fri, 17 Aug 2012 12:53:00 EDT. Please see our terms for use of feeds.
Permalink | pod2g | Email this | Comments