Archive for category Malicious hackers

Donald Trump has his Tweets Hacked by “low lives”

If you are one of the more than two thousand individuals who adhere to Brian Trump on Tweets, you might have seen an uncommon twitter from the skin coiffed property mogul last night.ather than connecting his “The Apprentice” United states TV display, or tweeting up on a governmental problem, the multi-millionaire showed up to have selected to quotation a lyric by hip-hop specialist Lil’ John.

These hoes think they elegant, well that is the category I’m skippen.It changes out that Brian Trump had, actually, had his Tweets consideration affected.The annoying twitter was quickly removed, and “the Donald” – who doesn’t believe in cover-ups – published an explanation:

 

 My Tweets has been seriously hacked— and we are looking for the criminals. Tweets will soon be unrelated if lowlifes are so quickly able to crack into records.

Of course, factors could have been much more intense. Think about if Brian Trump’s hi-jacked Tweets consideration had been utilized to publish a weblink to a harmful web page, for example. With some brilliant public technological innovation (“Win 100 % free passes for ‘The Apprentice’ huge final”?) you can quickly image many individuals hitting a risky weblink and possibly infecting their computer systems with malware or having their security passwords phished.

 

Quite how Trump’s consideration was affected is uncertain, but a affordable think would be that he had either selected a poor, easy-to-guess security password, or that he was using the same security password in several locations. Never a wise decision.

 

Multi-millionaire Trump ceased brief of other superstar Jeremy Clarkson, who promised to destroy the individuals who affected his Tweets consideration previously this week’s time.

Tags:

Emma Watson: the world’s dangerous celebrity in Web search

The most famous Harry Potter Star “Emma Watson” is found to be the world’s dangerous celebrity in internet search as many cyber criminals used her image to trick users into downloading malicious sites or to steal the personal information. The McAfee in their research had found that Watson is the recent targeted celebrity of cyber criminals in stealing personal information of all internet users. They also found that female celebrities are more likely aimed by hackers. There’s a one-in-eight possibility of landing on a malicious site when looking for the 22-year-old.

Emma Watson
McAfee provides the following guidelines to assist internet users defend themselves in opposition to Malware and Phishing:

  • Be careful in downloading anything that prompts you to click first before showing the actual content.
  • Downloading free may plays high role in affecting your computer. If you download some files or videos, be alert in clicking.
  • As nearly all public use different tools to look for celebrities, be confident you have up-to-date, complete security for all of your tools.

 

Reference URL: http://www.mcafee.com/us/about/news/2012/q3/20120910-01.aspx?cid=110907

Be Aware of clicking the nude pictures of “Prince Harry”

The internet is in ferocity after what come out to be unclothed photos of Prince Harry playing “strip billiards” with a group of girls in Las Vegas hotel were available online.

This news seems to be real that Prince Harry is in nude with young women and there are ample online users who possibly will sense excited to observe what all the commotion is regarding.

But be aware of clicking on a link shared by social media websites about this news, it may infect your computer or may causes some dangerous problem in your computer.

Get more information on http://nakedsecurity.sophos.com/2012/08/22/naked-prince-harry-pics/

Consequently, Mila Kunis, if it wasn’t your phone so as to was hacked..

Mila Knishes kerfuffle about the veer of celebrities who have had their phones it seems that hacked and naked photos bare on the internet continues. But now one of the celebrities denies that her phone was hacked at all. But that doesn’t mean that they were a unblemished example of computer security…Past victims of alleged phone hacking have built-in stars such as Scarlett Johansson, Christina Aguilera, Lady Gaga, Miley Cyrus and High School Musical’s Vanessa Hudgens.

 

Most lately, however, Mila Kunis and Justin Timberlake have establish themselves in the spotlight, with reports that her phone was hacked, and her “associates with benefits” co-star Timberlake was pictured semi-nude lying on a bed and wearing some pink underwear on his head. In the meantime, images of Miss Kunis lying in the bath and a close part of an nameless man were said to be in flow, along with what were said to be private SMS book messages between Kunis and Timberlake.

 

However, according to a statement issued on behalf of Justin Timberlake and Mila Kunis – the actress’s phone was not hacked. “The media’s tentative nature of this story and its persistence that there is any inappropriate communication between the two parties is entirely false,”

 

“At no time did Mr. Timberlake and Ms. Kunis exchange unsuitable texts or emails. We would like to verify that the photo addressed in the media of Ms. Kunis was in fact not from any phone but from an inactive email account that has not existed in 3 years. In regard to the other photos in question, they were never exchange between the two parties.”

 

“We are at present working with the establishment on this matter and will take the good legal action required.” Mila Kunis and Justin TimberlakeKunis and Timberlake have deprived of being in a relationship since rumors began to emerge about an affair during the making of their movie “Friends with benefits”.

 

I have no idea if Kunis and Timberlake have been snogging, or if they’re been sending each other flirty text messages or photographs. obviously they’re saying that hasn’t happened. But the above statement does suggest that the picture of Kunis in the bath is legitimate, and was grabbed by a hacker from an “inactive email account”.

 

Whoever owned that email account (and a fair supposition would be that it is Kunis, or someone close to her) was clearly not practicing safe computing. If you leave an email account to wither and die, it might be best to clear out any surplus emails first and wipe any personal information.

Ideally the email account would be erasing in its total if you’re not planning to use it anymore. Otherwise, you might be leaving a tempting treasure chest for a celeb-obsessed hacker to break into, while you attention is unfocused elsewhere. At the very least, ensure that an email account is using a unique, hard-to-crack password for heaven’s sake.

 

There’s still much more to this celebrity nude photo hack story to come out, and it will be attractive to hear if the FBI manage to identify who is responsible, and how it is that cybercriminals are receiving their hands on so much personal compromise material.

 

In the meantime, celebrity websites might be wise to keep in mind that if they issue photographs that have been hacked from the phones or email accounts of celebrities they are, effectively, handling stolen goods… and commit a crime themselves.

Tags:

Malware attack poses as bloody photos of Gaddafi’s death

Gaddafi The bereavement of Libyan dictator Colonel Gaddafi has almost unavoidably resulted in cybercriminals captivating advantage of the news story, and the universal public’s apparent interest in viewing ghoulish photos and videos of his previous moments.

 

Malicious hackers have spammed out an attack posing as pictures of Gaddafi’s death, trick users into believe that they came from the AFP news agency and are life form forwarded by a fellow internet user.

 

A typical message looks like this:

 

Subject: Fw: AFP Photo News: Bloody Photos: Libya dictator Moammar Gadhafi’s Death

Message body:

Libya dictator Moammar Gadhafi’s Death

 

Libyan dictator Moammar Gadhafi, the most required man in the world, has been killed, the country’s rebel government claim Oct. 20. The flamboyant oppressors who terrorize his country and much of the world during his 42 years of despotic rule was cornered by insurgents in the town of Sirte, where Gadhafi had been natural and a stranglehold of his supporters.

 

Windows computer users who decompress the emotionally involved file are put their PCs at risk of infection. The RAR archive file creates a malicious file called:

Bloody Photos_Gadhafi_Death\Gadhafi?rar.scr

Although there has been much conjecture in the media about the option of Gaddafi-related malware attacks and scams, this is the first one that I’ve seen since the death of Gaddafi made news headlines around the world the past.

Internet users would be wise to keep in mind to be very cautious about the links they click on, and to be suspicious of unsolicited attachment.