Monday, April 9, 2012

"OMG I'm laughing so hard at this picture.." DMs Phish for Twitter Login Credentials

TwitterOne, two, account phishers are coming for you...

That’s right, Twitter users!

Cybercrooks are hoping to cheat you out of your Twitter account by sending you a DM that reads something like this:

Twitter Phishing DM
rofl...omg i am laughing so hard at this picture of me my friend posted [LINK]

Twitter Phishing PageUpon clicking the link, you will be taken to a Twitter login phishing page claiming that your session has expired and that you will need to login again.

If you make the mistake of logging in, your Twitter username and password will be sent off to the bad guy so he can take over your account and do whatever he/she wishes.

Take note that multiple domains may be used in this phishing scheme and that it’s likely the scammers change the domain names as they are flagged.

As a rule of thumb, it is always a good idea to double-check the URL in your browser’s address bar before submitting your username and password – regardless of what website you’re logging into. So try to make it a habit of doing so.

Stay safe, Tweeters!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

"Thank You for Your Video" YouTube Spam Links to Pharmacy Websites

YouTube LogoI hate to break it to you, but YouTube isn’t really thanking you for your video.

What you’re looking at is the latest variant of a YouTube spam campaign focused on driving traffic to illegal pharmacy websites.

Yes, spammers are spitting out another round of those YouTube spam emails we saw at the beginning of March. If their spam schedule is anything like last month’s, we can expect to see many more of these messages in the days to come.

Don’t be fooled by the noreply@youtube.com sender address either – it’s spoofed to make you think the email is genuine, even though it’s far from it:

YouTube Notification Spam
From: YouTube (noreply@youtube.com)
Subject: Thank you for your video

YouTube              help center | e-mail options | report spam

YouTube sent you a notification:
Thank you for your video
To: [YOUR EMAIL]

http:// www.youtube.com/watch?v=jK1FKHSjR0n&feature=b-mv

You can unsubscribe from our emails and newsletters at any time. Click here to unsubscribe.

© 2012 YouTube, LLC
901 Cherry Ave, San Bruno, CA 94066

All of the links within the emails point to a random third-party site that will direct you to an illegal pharmacy website, including the fake “unsubscribe” link.

If you happen to receive this email or one similar to it, it’s strongly recommended that you delete it without clicking on any of the links. Remember: less clicks means less motivation to spam!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Buy of the Week: 13.3" MacBook Pro for $1,448!

13-inch Apple Macbook ProThe first time you pick up a MacBook Pro you'll notice the difference it makes. The entire enclosure is thinner and lighter than other notebooks. It looks polished and refined. And it feels strong and durable - perfect for life inside (and outside) your briefcase or backpack.

Until April 13th, 2012, you can order a new 13-inch Apple MacBook Pro from Hyphenet for only $1,448 shipping!

Call Hyphenet at (619) 325-0990 to order your 13-inch MacBook Pro today!

Specifications for the 13-inch MacBook Pro

















































Display13.3" Widescreen LED backlight
TFT 1280 x 800 ( WXGA )
ProcessorIntel Core i7 2.8 GHz
RAM4 GB DDR3 SDRAM - 1333MHz
Hard Drive750 GB HDD (5400 rpm)
Graphics ProcessorIntel HD Graphics 3000
NetworkingGigabit Ethernet,
WLAN : 802.11 a/b/g/n,
Bluetooth 2.1 EDR
Operating SystemMac OS X 10.7 Lion
Optical DriveDVD±RW (±R DL)
CameraIntegrated (1280 x 720)
BatteryLithium polymer - 63.5 Wh (up to 7 hrs run-time)
WarrantyApple 1-year limited warranty
Technical support - phone consulting - 90 days

Don't miss out on this Buy of the Week! Call Hyphenet at (619) 325-0990 to order your 13-inch MacBook Pro!


Buy of the Week offer valid through April 13th, 2012.

* Shipping, taxes and CRV may apply.

Hyphenet is an Authorized Apple Reseller.

Friday, April 6, 2012

Bogus AT&T Billing Emails Point to Malicious Sites Serving Malware

AT&T LogoIs that a real AT&T wireless bill for over $900 or is that a trick?

Unless you’ve been chatting up a storm, texting everyone you can non-stop or downloading every app that even APPEARS interesting to you, it’s likely just a ploy to get you to click on a link that will take you to a malicious site that will attempt to install malware on your PC.

Yes, it’s the very same wool that cybercrooks recently tried to pull over Verizon Wireless customers heads'.

At first glance the spam messages, titled "Your wireless bill is ready to view" appear genuine, alerting you that your latest wireless bill is available to view online. That's how they get you though, for not a single link within the bogus AT&T billing email points to the AT&T website:

 AT&T Bill Spam Screenshot Credit: PC Mag SecurityWatch


Instead, they will direct you to a compromised website that will attempt to exploit vulnerabilities within Adobe Reader, Adobe Acrobat or Windows Help Center in order to plant malware on your computer.

If you receive an AT&T billing notice with an outrageous balance, be sure that you mouseover any embedded links to make sure they point to the actual AT&T domain (att.com) and not some third-party site.

No att.com domain = no clicking. You've been warned!

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Thursday, April 5, 2012

Facebook Mobile App Flaw Leaves Accounts Open to Hijacking on Jailbroken Phones

Facebook SecurityIs there a security hole in the Facebook app for iOS and Android that could allow an attacker to easily hijack your Facebook account?

Apparently there is, but only if your phone is jailbroken.

It was reported this morning that a U.K. based Android & iOS app developer, Gareth Wright discovered a rather serious security flaw within the native Facebook app that could potentially be used to hijack Facebook accounts.

The vulnerability stems from the fact that a user’s full oAuth credentials were stored in plain text in the Facebook app’s plist file, which houses a user’s settings and carries an expiration date of January 1st, 4001.

Wright made the discovery after rummaging through application directories using a free iExplorer tool (often used to easily browse through iOS files) and finding that the popular Draw Something game by OMG POP held a Facebook access token, also kept in plain text.

Curiosity then drove him to copy the hash and run a few FQL (Facebook Query Language) queries, which allowed him to pull “pretty much any information” from his Facebook account.

From there, he couldn’t resist knowing what the Facebook app stored and browsed through the Facebook application directories until he found the unencrypted authorization credentials tucked away in the plist file.

Of course, should an attacker get their grubby paws on a user’s Facebook token, they can hijack that user’s account by plugging it into their Facebook app and firing up, as Wright witnessed first-hand when he shot his own .plist file over to his friend and watched as said friend posted updates to his Facebook Wall, sent some private messages, liked a few random pages and installed an application or two.

However, there was a single piece of information that Wright didn't mention in his Tuesday post: he was using a jailbroken iPhone.

According to an offical statement posted on the official Facebook Security page, the access token is only vulnerable on jailbroken phones:
We have noticed several articles claiming your Facebook account is at risk if you use Facebook for iOS or Android. This is NOT true.

Facebook's iOS and Android applications are only intended for use with the manufacture provided operating system, and access tokens are only vulnerable if users have modified their mobile OS (i.e. jailbroken iOS or modded Android) or have granted a malicious actor access to the physical device. To protect yourself we recommend all users abstain from modifying their mobile OS to prevent any application instability or security issues.

So, if you’re running the Facebook app on an unaltered iPhone or Android device, there’s no reason to worry.

But if you ARE using a jailbroken device, take heed to Wright’s warnings and think twice before hooking your iPhone up to a stranger’s speaker dock or USB cable. Oh, and make sure you have a way to remotely wipe your device should it ever end up stolen.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

When Good Websites Go BAD! [INFOGRAPHIC]

Malware BugWe all know how an innocent web surfing session can easily result in a malware infection.

But how often does that happen? And how often does it happen with popular sites that have been online for years? Those have to be safer, right?

Not necessarily...

Security researchers over at BarracudaLabs recently ran a month-long experiment to determine just how safe the top-visited websites are.  Using an automated tool that "forces a web browser inside a Windows virtual machine to visit a URL to see what happens to the browser, its plugins, and the operating system," they examined the 25,000 most popular domains listed on Alexa everyday for the entire month of February.

What did they find? Well, I’ll just let this infographic paint the picture for you:

When Good Sites Go Bad [INFOGRAPHIC]

What steps are you taking to protect your PC from malware threats?

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.

Wednesday, April 4, 2012

Facebook Users Targeted by Latest Ice IX Trojan Variant

Facebook Icon (circle)“In order to provide you with extra security, we occasionally need to ask for additional information. We need to verify your identity with a credit or debit card.”

That is the sales pitch thrown at unsuspecting users when they attempt to login to their Facebook account from a computer infected with the latest version of Ice IX, Trusteer reports.

Below the verbiage is an assortment of input fields, injected into the page by the malware in hopes of stealing sensitive financial information like the cardholder name, credit card number, expiration date, CID and the billing address.

Billing Page Injected into Facebook Login Process


Once the user provides that information, it will be sent directly to the attacker so they can use it to run up fraudulent charges or possibly sell it to the highest bidder.

Trusteer researchers even found a “marketing” video used by the Ice IX authors that demonstrates how the web injection attack is carried out:

  1. Ice XI sends CC info to the attackerThe user goes to www.facebook.com and logs into an account.

  2. A dialog window pops up displaying the message explained above, although the video version takes it a bit further by asking for a social security number and date of birth in addition to the credit card details.

  3. The information supplied by the user is shown to be delivered via instant message to the attacker.


It is important to remember that Facebook will never ask for your credit card number, social security number or any other sensitive information aside from your Facebook username and password while logging in. So if you see a page asking for private information upon login, there’s a good chance your PC has been infected with some type of malware.

Additionally, Facebook informed Trusteer that they actively detect known malware on users’ devices to provide them with a fix. You can run through the check point by visiting on.fb.me/AVCheckpoint. (note: you must be logged out of your account).

Screenshot Credits: Trusteer

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+.