Published Jun 26 2012 by Naked Security - Sophos

Watch out! Widespread wire transfer confirmation emails carry malware

Cybercriminals have widely spammed out a malware campaign today, posing as a confirmation email about a wire transfer.

You may not be the kind of fellow who would fool for the attack, but can you say the same for your friends and family members?

Share this 

Related Stories

First reported 9 hours ago - Updated 25 mins ago - 13 reports

Nearly 600 U.S. businesses compromised by 'Backoff' POS malware

Attackers are brute-forcing popular remote desktop software to infect point-of-sale (POS) devices with a relatively new malware known as Backoff, according to a Thursday alert issued by the United States Computer Emergency Readiness Team (US-CERT).So ... [Published SC Magazine US - 25 mins ago]
First reported 9 hours ago - Updated 32 mins ago - 3 reports

'BadUSB' malware highlights the danger of plugging random mystery drives into your computer

Another day, another apocalyptic prognostication of computer security doom , this time focusing on the omnipresent USB connection. It's called 'BadUSB', and it's a malware proof-of-concept created by security researchers Karsten Nohl and Jakob Lell that ... [Published Windows Phone Central - 32 mins ago]
First reported 8 hours ago - Updated 1 hour ago - 4 reports

Security Researchers Discover Fundamental Security Flaw in USB, No Fix in Sight

The bad side of USBOh great, as if it wasn't bothersome enough knowing that all our online communications are susceptible to government spying with very little we can do about it, now we've come to find out that just by having a USB port, there exists ... [Published Maximum PC - 2 hours ago]
First reported 10 hours ago - Updated 2 hours ago - 2 reports

Mysterious Malware 'Crouching Yeti' Has Infected High-Profile Targets Worldwide

Energetic Bear , a malware campaign that was initially thought to have come from Russia and only target power grids, is much more widespread and potentially dangerous than cybersecurity experts first imagined.A new report by the Kaspersky Lab indicates ... [Published Motherboard Magazine - 2 hours ago]
First reported 10 hours ago - Updated 4 hours ago - 2 reports

Backoff - Technical Analysis

As discussed in the an advisory published by US-CERT , Trustwave SpiderLabs has discovered a previously unidentified family of Point of Sale (PoS) malware. This blog post serves as a technical analysis of the Backoff malware family. While a number of ... [Published SpiderLabs Anterior - 4 hours ago]
First reported 13 hours ago - Updated 30 mins ago - 4 reports

Malware: Every USB port is “defenseless” against new scam

Almost all desktop and laptop computers can be overtaken and stripped of data via malicious devices inserted into the USB port – a technique which bypasses all current security measures, and is described as “almost like a magic trick” by Karsten Nohl ... [Published We Live Security - 6 hours ago]
First reported Jul 29 2014 - Updated Jul 30 2014 - 26 reports

Bug in Android could allow access to personal data

A vulnerability has been detected in Google Android that can allow malware to be passed off as authorised applications which can control device settings and access user information including credit card data.BlueBox Security reported the bug, which it ... [Published - Jul 30 2014]
In Focus


sort by: Date | Relevance
JULY 2014 UNIFIED THREAT INTELLIGENCE REPORT [Published Krypt3ia - 52 mins ago]
Unified Threat Intelligence Report   July 2014   Executive Summary Overall the month of July 2014 has been fraught with new malware campaigns against various entities and this has been the trending since approximately 2010. Malware today ...
Most USB thumb drives can be reprogrammed to si... [Published PC World: Techlog - 1 hour ago]
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found. The problem is that the majority of USB thumb drives, and ...
Threat Outbreak Alert RuleID10873: Email Messag... [Published Threat Outbreak Alerts - 1 hour ago]
"Scanned Image from a Xerox WorkCentre" spam [Published Dynamoo Blog - 2 hours ago]
This is a thoroughly old school spam with a malicious attachment.Date:Thu, 31 Jul 2014 18:16:08 +0000 [14:16:08 EDT]From:Local Scan [scan.614@victimdomain]Subject:Scanned Image from a Xerox WorkCentreYou have a received a new image from Xerox WorkCentre.Sent ...
Cyber Crime unit helps avert suicide of young man [Published Latest News - 4 hours ago]
A man who declared on a social networking site that he would kill himself is now receiving psychological support following the intervention of the police’s Cyber Crime unit, it was revealed on Thursday.The unit’s experts traced the man’s location and ...
1 2 3 4 5 6 7 8 9 10 ...


sort by: Date | Relevance
StubHub caught in global cyber crime ring [Published Reuters Video: Top News - Jul 24 2014]
StubHub caught in global cyber crime ring [Published Reuters Video: Business - Jul 24 2014]
The Right to Bear Denial-of-Service Attacks [Published Slate Magazine - Jun 24 2014]
How to beat world's deadliest virus [Published Reuters Video: Business - Jun 09 2014]
How to beat world's deadliest virus [Published Reuters Video: Business - Jun 06 2014]
1 2 3

Press Releases

sort by: Date | Relevance
Merchant Community Coalesces Behind Open Proces... [Published Financial Services - Jul 28 2014]
Hexis Cyber Solutions and Infosecurity Magazine... [Published GlobeNewswire: Acquisitions News - Jul 15 2014]
Rainbow International Corporation Warns Public ... [Published GlobeNewswire: Advertising News - Jun 29 2014]
Speech: Karen Bradley Speech on UK Cyber Security [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
Speech: Karen Bradley Speech on Managing Cyber ... [Published Keeping the UK safe in cyber space - Activity o ... - Jun 17 2014]
1 2 3 4 5
Contact Us

Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.