Feeds

Smut lure powers Tumblr phish scam

Thousands hooked

Security for virtualized datacentres

Security watchers are warning about a massive phishing attack against Tumblr users.

Maliciously constructed web pages designed to look like legitimate Tumblr addresses have been poisoned with links that supposedly offer access to lurid content, providing prospective marks log in to the micro-blogging service.

Users who fall for the ruse surrender their account to hackers, exposing their online friends to follow-up attacks in the process.

The ultimate aim of the attack is unclear, but it could be account credentials are being harvested so that attackers can try to access more sensitive webmail or online banking accounts using the same login credentials.

Net security outfit GFI Software estimates that more than 8,000 have been taken in by the ruse.

It seems that an attack that began with a low-level attack designed to trick users into handing over their login credentials in order to take a test and join the "Tumblr IQ Society" last Thursday has morphed into a more potent and widespread attack using a more salacious lure.

General advice on avoiding phishing scams can be found in a blog post by Eset here. ®

Beginner's guide to SSL certificates

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.