Feeds

Secret ROYAL BABY birth VIDEO leaked! (And other malware scams)

We KNEW there'd be an IT angle on the little blighter

Next gen security for virtualised datacentres

It's the moment malware writers worldwide have been waiting ages for: millions of royal-watchers at home and at work will be in front of their computers, hunting for the first pictures of the soon-to-be-born third heir to the throne.

The Duchess of Cambridge's labour has started, it was confirmed this morning. The baby, whatever its sex, will be third in line to the throne; following a change in the law, if the child is a girl* she will not be leapfrogged by a younger brother to the crown.

And as with many a popular story - be it a natural disaster or celebrity death - malware-flingers have long been gestating plenty of scams and malware which they are more than ready to deliver.

"Malware authors worldwide have been waiting ages for this," according to anti-malware veteran turned independent security blogger Graham Cluley. "Exclusive first pictures", "Secret video from inside delivery room" and "Sex revealed" images from the royal birth might become the theme of scams, according to Cluley. "I don't want to scaremonger, but it's easy to imagine," he said.

The story of a royal birth will be so big that it's inevitable the bad guys will jump on the bandwagon, according to Cluley, who pointed out that malicious actors had previously menaced Wills and Kate.

Cybercriminals were quick to exploit Kate and Wills' engagement. They were also quick to latch onto a story about a possible pregnant Kate Middleton doll in an attempt to entrap user in malware scams.

High-profile news stories are often used to trick surfers into visiting scareware portals or exploit-ridden sites using search engine manipulation, or blackhat SEO tactics. But virus writers are unreliable types at the best of times, so scams do not always appear.

Sean Sullivan, a security adviser at F-Secure, joked that scams might be more likely if Kate gives birth to twins.

He said: "So, it it were twins, and a C-section, is it the doctor that decides the line of succession. Are there protocols?" ®

* Hours after publication, the Duchess of Cambridge gave birth to a boy, we're pleased to add.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Govt control? Hah! It's IMPOSSIBLE to have a successful command economy
Even Moore's Law can't help the architects of statism now
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
This'll end well: US govt says car-to-car jibber-jabber will SAVE lives
Department of Transportation starts cogs turning for another wireless comms standard
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
New voting rules leave innocent Brits at risk of SPAM TSUNAMI
Read the paperwork very carefully - or fall victim to marketing shysters
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.