Language Selection

English French German Italian Portuguese Spanish

Phishers Sinking to New Lows

Filed under
Security

Don't get me started on spam. But the other day, scanning the dregs of my spam filter, there was this one that stood out from the hundreds of unsolicited commercial e-mails that pitch porn, get-rich-quick schemes, cheap pharmaceuticals, urgent business proposals and sure-thing investments. All no-brainer deletes. Click, click, click.

But this one stopped me cold. It raised images of stressed-out and distraught military families stunned by the message that their bank accounts had been breached (all the more troubling after last week's news that someone had indeed hacked an Air Force nonfinancial database containing 33,000 Social Security numbers). Recipients could follow the message's instructions, click on a link to a Web site, and divulge their passwords and confidential information.

Only, that urgent notice isn't from their bank. It's from a crook.

You probably knew that already. Those daily spams, supposedly from eBay, AOL or PayPal? Saying your account has been corrupted? If you don't have eBay, AOL or PayPal accounts, they're easy rip-offs to recognize. Click, click, click. Gone.

But if your thoughts are halfway around the world, in a war zone where every day is a life-or-death matter for a loved one, and your bank is the Armed Forces Bank, then just maybe you get fooled this one time. Just takes once. Low-life scammers count on it -- all the way to the bank.

Full Story. Free registration may be required.

More in Tux Machines

Linux Devices

Open Source Software A Core Competency For Effective Tech M&A

Imagine your company just acquired its competitor for $100 million. Now imagine the company’s most important asset – its proprietary software – is subject to third-party license conditions that require the proprietary software to be distributed free of charge or in source code form. Or, imagine these license conditions are discovered late in the diligence process, and the cost to replace the offending third-party software will costs tens of thousands of dollars and take months to remediate. Both scenarios exemplify the acute, distinct and often overlooked risks inherent to the commercial use of open source software. An effective tech M&A attorney must appreciate these risks and be prepared to take the steps necessary to mitigate or eliminate them. Over the past decade, open source software has become a mainstay in the technology community. Since its beginnings, open source software has always been viewed as a way to save money and jumpstart development projects, but it is increasingly being looked to for its quality solutions and operational advantages. Today, only a fraction of technology companies do not use open source software in any way. For most of the rest, it is mission critical. Read more

AMD Graphics

SUSE Leftovers

  • Git, Kernels, LightDM, More update in Tumbleweed
    Topping the list of updates for snapshot 20161129 was the update to Light Display Manager 1.21.1, which added an Application Programming Interface (API) version to the greeter-daemon protocol for future enhancements. Other updates in the snapshot include openVPN, which added a recommended utility for network and traffic protocols, and subpackages for systemd relevant for 32-bit users. Desktop manager xfdesktop updated to version 4.12.3 and introduced rotating wallpaper images if the images contain rotation information. The programming language vala, which aims to bring modern programming language features to GNOME developers without imposing any additional runtime requirements, updated in the 20161129 and 20161201 snapshots.
  • openSUSE Leap 42.1 upgrade to Leap 42.2
  • openSUSE Tumbleweed – Review of the Week 2016/49
    I’m sure nobody doubted it, but Tumbleweed is back on the roll! And in fact, we did the impossible and released 8 snapshots in a week. This review will cover {1201..1208}.