JMH
Banned
Posted by Dancho Danchev.
More info -
The ultimate guide to scareware protection | Zero Day | ZDNet.com
Throughout the last two years, scareware (fake security software), quickly emerged as the single most profitable monetization strategy for cybercriminals to take advantage of. Due to the aggressive advertising practices applied by the cybercrime gangs, thousands of users fall victim to the scam on a daily basis, with the gangs themselves earning hundreds of thousands of dollars in the process.
Not surprisingly, Q3 of 2009 was prone to mark the peak of the scareware business model, whose affiliate program revenue sharing scheme is not only attracting new cybercriminals due to its high pay-out rates, but also, is directly driving innovation within the cybercrime underground acting as a reliable financial incentive.
This end user-friendly guide aims to educate the Internet user on what scareware is, the risks posed by installing it, how it looks like, its delivery channels, and most importantly, how to recognize, avoid and report it to the security community taking into consideration the fact that 99% of the current releases rely on social engineering tactics.
More info -
The ultimate guide to scareware protection | Zero Day | ZDNet.com
My Computer
System One
-
- Manufacturer/Model
- LAPTOP. HP Pavilion dv7-1005TX .
- CPU
- IntelCore [email protected] x2
- Memory
- 4.00 GB installed, max capacity 8 GB.
- Graphics card(s)
- Nvidia GeForce 9600M GT & 512MB DDR2 dedicated graphics mem.
- Monitor(s) Displays
- 17.0" diagonal WXGA + High definition brightview widescreen infinity display.
- Screen Resolution
- 1440 x 900
- Hard Drives
- SPECS. Drive 1. 298.09 GB Fujitzu MHZ2320BH G2 ATA Device Drive 2. [ All as above.] CONFIG. C:\287.65 GB, D:\298.09 GB, E:\10.44 GB.
- Case
- Laptop / notebook.
- Cooling
- Stock.
- Mouse
- Synaptics PS/2 Port touch pad.
- Keyboard
- IBM enhanced
- Internet Speed
- ADSL [ Too slow.]
- Other Info
- Webcam.