#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
AI Security

identity theft | Breaking Cybersecurity News | The Hacker News

Scammers Impersonate IT Helpdesk to Spread Rogue Antivirus

Scammers Impersonate IT Helpdesk to Spread Rogue Antivirus

Nov 15, 2010
Criminals are posing as IT support staff, calling unsuspecting U.K. internet users to push rogue antivirus software. GetSafeOnline.org reports this as part of their Internet safety week campaign. These scam operations often involve up to 400 people using sales techniques and social engineering to deceive victims. The goal is to obtain credit card information through the sale of rogue antivirus software or gain remote access to the victim's system for future use. Typically, the scam begins with an unexpected call. The caller, pretending to be an IT helpdesk technician, builds rapport with the victim, presenting themselves as trustworthy by using personal information available online. The victim is then questioned about computer problems like slow email or internet browsing. Once the victim admits to an issue, the caller exaggerates the problem and offers a solution for a small fee. The caller might say, "For a small fee, we can install something to fix your system and clean it co
Cyber Stalking and Defamation Criminalized in IT Act Amendments

Cyber Stalking and Defamation Criminalized in IT Act Amendments

Nov 03, 2010
With mobile phones now essentially serving as personal computers, proposed amendments to the Information Technology Act, 2006, specify that transmitting offensive or menacing text, audio, or video can result in two years of imprisonment. This punishment also applies if the content is false and intended to cause annoyance, inconvenience, danger, or insult. Furthermore, using a cellphone to impersonate and cheat someone can lead to five years of imprisonment. The need to define "communication device" in the proposed amendments arose because the current law does not specify which devices fall under this category. The amended IT Act clarifies that a cellphone or a personal digital assistant (PDA) is considered a communication device, allowing legal action accordingly. In light of various scandals over the past two years, including the arrest of a prominent portal's CEO, the government has introduced new cybercrimes under the proposed law. The amended Act, presented to the
HUMINT: Diving Deep into the Dark Web

HUMINT: Diving Deep into the Dark Web

Jul 09, 2024Cybercrime / Dark Web
Discover how cybercriminals behave in Dark Web forums- what services they buy and sell, what motivates them, and even how they scam each other. Clear Web vs. Deep Web vs. Dark Web Threat intelligence professionals divide the internet into three main components: Clear Web - Web assets that can be viewed through public search engines, including media, blogs, and other pages and sites. Deep Web - Websites and forums that are unindexed by search engines. For example, webmail, online banking, corporate intranets, walled gardens, etc. Some of the hacker forums exist in the Deep Web, requiring credentials to enter. Dark Web - Web sources that require specific software to gain access. These sources are anonymous and closed, and include Telegram groups and invite-only forums. The Dark Web contains Tor, P2P, hacker forums, criminal marketplaces, etc. According to Etay Maor, Chief Security Strategist at Cato Networks , "We've been seeing a shift in how criminals communicate and co
Expert Insights
Cybersecurity Resources