Monthly Archives: February 2016

New Phishing Gameplan Targets Facebook Users

Phishing agents have found a fertile new ground to launch malware attacks. They are now targeting the world’s most popular media sharing platform – the Facebook.

This was a finding unearthed by the Comodo Threat Research Lab in January earlier this year. According to Comodo researchers, phishing agents were found to be sending spam emails to Facebook users making it look like a new message in their Facebook mailbox.

It (phishing) may not be the most groundbreaking attack method cybercriminals use — but there’s no denying that cybercriminals are becoming more clever when crafting their messages. More frequently, they’re using well-known applications or social platforms and also action-oriented language in the subject lines to entice recipients to open the emails, click the links or attachments and spread the malware,” said Fatih Orhan, Director of Technology for Comodo Threat Research Lab.

In early January, the Comodo team discovered a similar tactic where malware agents sent fake emails pretending to be from WhatsApp, attempting at luring recipients to click malicious attachments that came with the mail. Comodo researchers said that both phishing campaigns probably is a gameplan originating from the same hive of cybercriminals.

Users should be cautious of any email that requires information or that redirects to a URL Web page— and especially if there is a file download. Comodo is working around the clock to stay ahead of cybercriminals’ next moves by creating innovative solutions that protect and secure endpoints and keep enterprises and IT environments safe” Orhan added.

Orhan heads a team of more than 40 ethical hackers, IT security professionals, computer scientists and engineers in the Comodo Threats Research Lab. The team rigorously work to analyse the latest malware types and tactics, filter out spams, decipher phishing and malware messages spread all across the globe. On average, the team analyses nearly 1 million potential malicious files and emails every day and apply the insights in making Comodo security products that can deftly tackle security threats.

Being an industry leader in the information security sector, the company is trying to spread public awareness against the risks of identity theft and unsolicited data breach. During the last Super Bowl 50, the company offered free endpoint protection and secure encryption channel to the public watching the game live in the Levi’s Stadium in order to prevent rogue wi-fi hot spots from stealing their identities.

We noticed a number of rouge open Wifi Access Points in the vicinity and did a little bit of security research and found that hackers are trying to capitalize on the event by tricking people into connecting their mobile devices to these criminal hotspots to intercept their data…” said John Peterson, VP of Product Marketing at Comodo.

Related Free Security Products:

Comodo Internet Security

Comodo Antivirus FREE


Tags: , , ,

School Websites’ in UK is Full of Porn Links, Gambling

Parents of school children in the UK are infuriated to learn that their children are exposed to the dangers of pornographic materials, gambling and contrabands through their schools’ websites.

The research was recently published in the Infosecurity Magazine and has since created ripples in the media and the cybersecurity community. Terence Eden, a UK-based researcher and tech blogger carried out the research and found out that several websites belonging to schools were riddled with dodgy ads, or redirected to porn and gambling sites. Most of these sites, Eden found, were in a state of neglect and left unchecked for many years.

uk school website hacked

One of such websites belonging to the Churchfield CE Primary School was found to have hidden pages that automatically navigated visitors to websites containing rogue content. Even more disturbing was the finding of the website belonging to Portal House School – that caters to special students who suffer from social, behavioral and emotional difficulties – had “reams of sexually explicit content.”

Eden discovered the security cracks in school websites while carrying out his broader research that aims to gauge the security of government websites. In an earlier research publication, Eden found several government websites left ‘abandoned’ for scammers/spammers to lay their traps.

“The Government takes almost no interest in the way some of its official websites are managed. The Department for Education is particularly inept when it comes to technology which – given that our country’s future relies on technological progress – is more than a little depressing,” Eden wrote in his blog after the news was made public in January.

Furthermore, the shoddy external links seem to fare well in SEO ranks because hackers behind the scam are linking them to trusted school websites with “” domains. Eden also claimed that users could easily access the said sites through Google’s results page when someone typed a query about the schools in the search engine. “The people running these sites really ought to be closely monitoring them,” Eden is quoted as saying to the magazine.

To keep kids out of harm’s way, the government should set new cyber security standards for academic websites and centralize the internet security issues under a single authority.

Leave a comment

Posted by on February 9, 2016 in Internet Security


Tags: ,

Antivirus is not the only Security Factor


When we think of protecting a computer from virus attacks, the first thing that comes into our mind is antivirus. Once an antivirus is installed in our system, we get full confidence that our system is secure and protected from malware. But the real fact is that antivirus is known to be the last line of defense. This is just a reflex of our ignorance, Most of us have a minimal level of the real knowledge in taking security measures against viruses and other hacker’s attack.

There are always other options that are there out in store to establish protection for your digital environment. It is our responsibility to know understand the protective measures apart from using antivirus software.

  • Updating the Operating System
  • Updating the Applications
  • Enforcing minimal rights to the guest users
  • Backing up all the Information

These are some of the other security measures that should be taken into consideration along with the installation of an antivirus software.

Updating the Operating System:

  • Its good to know that you have bought a new computer, Once you open your new laptop check for any operating system updates. Outdated Operating System is always prone to suspicious malware, hence making he PC vulnerable.
  • Certainly you would find that a full scale update is at your service to make sure that your PC is updated.
  • Most of us use a pirated version, as it is cost effective. The bad story behind it is you will not get any proper updates on your pirated version of Operating System.

Updating the Applications:

  • Apart from vulnerabilities caused by Operating System updates, Hackers move their attention on installed applications of the host computer.
  • It might not take a long time to infect the PC, using an browsing information on an outdated Internet Explorer,
  • Opening a PDF through an infected Adobe Reader application, These may lead to PC insecurity.
  • To overcome all this, change your Internet Explorer Browser settings for automatic updates
  • Keep a check on your application updates.

Enforcing minimal rights to the guest users:

When you can access anything from your Personal Computer, It cannot be the case for all those who wants to access your personal computer, Keep a check for the guest users. Assign minimal rights for guest users with separate login access and password. You can restrict certain activities like software installation, changing system settings.

In most of the cases, a home based PC automatic login is set by default. This is where the user must be careful by not letting the system to vulnerability.

Backing up all the Information:

Some set of PC problems like user mistake, malfunctioning of an authenticated software or hardware failure cannot be handled by using only an antivirus software. Memorable photos, business documents can get corrupted due to any of the unexpected PC malfunctions. This can be prevented by taking a backup of all the files, folders, documents, and important applications through online cloud storage.

Ethics to Protect PC:

  • Use of the latest updated version of Operating System and Browser on your PC with robust defensive measures is important to combat any vulnerable threats.
  • If you find a file sent to you is suspicious do not open the file attachment
  • Some websites might try to trick you by organized ads temping you that you will a BMW or so, do download any such suspicious content on to your computer rather close the webpage.
  • Check for viruses on any USB stick once you plug into your computer. Do not enable auto play capability on your USB device.
  • Finally use a proper antivirus software along with firewall and other internet security products.


There are so many internet security and PC security products available to protect your PC, Choice is yours! Comodo Free Antivirus and its other security products is one of the best security products with world class features.

Leave a comment

Posted by on February 2, 2016 in Antivirus


Tags: , ,