Postcard from Hallmark” Virus Hoax – Urban Legends

A hoax circulating since February 2008 warns users to beware of "the worst virus ever" in the form of an email attachment titled "POSTCARD" or "POSTCARD FROM HALLMARK." Though real e-card viruses certainly do exist, this one is a hoax.

Note that while some versions of the hoax below claim the information was "verified" on Snopes.com, this is NOT true. What has been verified is a different e-card virus threat with a similar name. Proceed with caution!

Protecting Yourself From Viral Hoaxes and Threats

With so many real viruses in circulation with names almost identical to the bogus threats you may read about in hoax messages like the ones below, it’s crucial to know how to distinguish real virus threats from bogus ones.


http://urbanlegends.about.com/od/fauxphotos/fl/Postcard-from-Hallmark-Virus-Hoax-Urban-Legends.htm
 

Hospital pays nearly $17G in bitcoins to hackers

A Los Angeles hospital paid a ransom of nearly $17,000 in bitcoins to hackers who infiltrated and disabled its computer network because paying was in the best interest of the hospital and most efficient way to solve the problem, the medical center’s chief executive said Wednesday.

http://www.foxnews.com/tech/2016/02/18/los-angeles-hospital-paid-17g-ransom-to-hackers-who-disabled-computer-network.html

Alert (TA15-337A) – Dorkbot

Dorkbot is a botnet used to steal online payment, participate in distributed denial-of-service (DDoS) attacks, and deliver other types of malware to victims’ computers. According to Microsoft, the family of malware used in this botnet “has infected more than one million personal computers in over 190 countries over the course of the past year.” The United States Department of Homeland Security (DHS), in collaboration with the Federal Bureau of Investigation (FBI) and Microsoft, is releasing this Technical Alert to provide further information about Dorkbot.

https://www.us-cert.gov/ncas/alerts/TA15-337A

Crypto certificates impersonating Google and Yahoo pose threat to Windows users

People using Internet Explorer and possibly other Windows applications could be at risk of attacks that abuse counterfeit encryption certificates recently discovered masquerading as legitimate credentials for Google, Yahoo, and possibly an unlimited number of other Internet properties.

http://arstechnica.com/security/2014/07/crypto-certificates-impersonating-google-and-yahoo-pose-threat-to-windows-users/

Botnet aims brute-force attacks at point-of-sale systems

A new malware threat scans the Internet for POS systems and tries to access them using common usernames and passwords.

Thousands of compromised computers are actively trying to break into point-of-sale (POS) systems using brute-force techniques to guess remote administration credentials.

http://www.computerworld.com/article/2489805/cybercrime-hacking/botnet-aims-brute-force-attacks-at-point-of-sale-systems.html

Fake malware U.S. government bitcoin ban report

When the visitor clicks “Install,” they will be given several files, including the Install_Adobe_Flash_Player.exe, two DLL files and a ReadMe.htm. It turned out that the files were actually not for a Flash Player but instead a Trojan and the files place themselves into the Temp folder and become hidden. Once this process is completed, the computer becomes infected with the malware.

http://www.pfhub.com/fake-malware-u-s-government-bitcoin-ban-report-hitting-social-media-756/

How To Spot A Chinese Domain Name Scam

If I offered you a way to protect your car from ever getting stolen, or your house from ever getting broken into, would you pay me for it? Lots of people would — for many people, their brand is just as important as anything else. This is why Chinese domain name scams have become so popular, and so successful.

Chinese domain name scams are rampant. In a little bit, I’ll explain exactly what these scams are, but first it’s more important to understand what started them. The effort to get businesses to register for Asian domains to “protect the brand” has been ongoing for many years. It appears this became a phenomenon as early as 2006. But it has accelerated within the past year, after the CNNIC registry announced that the Chinese .CN domains were public.

http://www.makeuseof.com/tag/spot-chinese-domain-name-scam/