Top Tips For Email Security
In light of the recent cyber-attack on Parliament, there is no better time to provide some top tips for email security. On Friday, hackers hit...
Last year, researchers at the AppRiver security firm noticed that criminals were using SVG image files to send Ransomware. These SVG image files were within zip files claiming to be attached resumes in job application letters. Clicking on the unzipped SVG file would send the victim to a webpage that would eventually lead to a Ransomware infection.
Recently it has been discovered that a malware exploit can be installed by directly using the SVG image file attached to a Facebook or LinkedIn message. An SVG file can allow code to be placed within an image, unseen by the person viewing the image. In the case of this exploit, the code is in Java script, and viewing the picture will send the victim to a fake YouTube page. There, you will be asked to get an extension for your browser in order to view the image/video. Currently the SVG exploit is being used to either download Locky Ransomware, use the browser to learn passwords and credit card numbers, or to send the exploit on to other Facebook and LinkedIn contacts. After adding the extension suggested on the fake YouTube site, the browser is automatically redirected back to Facebook/LinkedIn where it uses the contact list to further spread the Malware. Currently the exploit has not yet been fixed, however a solution is being worked on.
For more information or support, Contact Our Team who will be able to help.
In light of the recent cyber-attack on Parliament, there is no better time to provide some top tips for email security. On Friday, hackers hit...
“Turn On Location Tracking to Allow ‘apps’ to Determine Your Location” How many times have you seen that pop up on one of your devices? How many...
It has been reported that a major UK Banking group has suffered a DDoS (Distributed Denial of Service) attack earlier this month, in an attempt to...