There's another Scam, on Facebook. "These are Hacks using current FB users Accounts. They dupe and create fictitious FB profiles then try to add the same friends in hopes to scam you." Read how it's done, Below, in my e-mails, with my friend Jeff...
Don
I got this e-mail. Looks like it is from FB. But, I wouldn't click on any links in it, to be safe... I did some research on Google and Scoured my FB Account. But, can't find any record of these New Requests. And these are all (including you)... Already my FB friends and have been for several years. I Downloaded all of my FB Activity. And it seems ok. No one, but me, has logged into my account, in these records, etc... Since you use FB every day. I thought you might know something about it... I'm putting my Research links below, too...
Don
-------- Forwarded Message --------
Subject: | RE: Do you know what this is about? Fwd: 3 others want to share with you on Facebook |
---|---|
Date: | Mon, 10 Apr 2017 04:22:54 -0500 |
From: | Jeff |
To: | Don |
Sorry it took me so long to answer...
-----------------------------------------
From: "Don"To: "Jeff"
Cc:
Sent: 08-Apr-2017 05:06:04 +0000
Subject: Do you know what this is about? Fwd: 3 others want to share with you on Facebook
Hey, I got this e-mail. Looks like it is from FB. But, I wouldn't click on any links in it, to be safe... I did some research on Google and Cowered my FB Account. But, can't find any record of these New Requests. And these are all (including you)... Already my FB friends and have been for several years. I Downloaded all of my FB Activity. And it seems ok. No one, but me, has logged into my account, in these records, etc... Since you use FB every day. I thought you might know something about it... I'm putting my Research links below, too...
Don
- Facebook.com e-mail I got seems to be from them Clean link Scan - Since your last visit, 3 people accepted your friend requests Google Search info
- Facebook Since your last visit, 3 people accepted your friend requests - Google Search
- "Since your last visit 88 people have accepted your friend requests"
- why is my facebook account sending friend requests to unknown people? | Facebook Help Community | Facebook
- Unknown people accepted my friend request which I never send | Facebook Help Community | Facebook
- My settings say that I sent a friend request that I did not send? | Facebook Help Community | Facebook
Jeff
-----------------------------------------
From: "Don"To:
Cc:
Sent: 10-Apr-2017 10:14:49 +0000
Subject: Re: Do you know what this is about? Fwd: 3 others want to share with you on Facebook
Ok, thanks... Ya I read something about people making fake duplicate FB accounts. And using them to trick people into what ever they can. And I though of someone Hacking my Password and using my account. Since, the notice, said. People had accepted m Friend Requests. But, my account shows no changes and I couldn't find any record of it sending out any Friend Requests. Still, I think I will change my password, to be safe...
Thanks,
Don
- FaceBook info
- How To : Delete Facebook Account Permanently | SocialBlogr
- How To : Download The Information You've Put on Facebook | SocialBlogr
- How To : Get New Facebook Messages (Email) Invitation | SocialBlogr
- Mom behind most-watched Facebook Live video visits its HQ
- setup facebook e-mail in thunderbird - Google Search
- Your Notifications
- Facebook Retreats on Privacy
- Apple, Google, Facebook Get More Senate Scrutiny Over Mobile Privacy | Epicenter | Wired.com
- Facebook Loosens Privacy Controls, Sparks a Backlash | Epicenter | Wired.com
- Facebook Nears Settlement on Charges It Misled Users on Privacy - WSJ.com
- Facebook Nears Settlement on Charges It Misled Users on Privacy - WSJ.com
- Facebook Retreats On Privacy | Fox News
- facebook retreats on privacy - Google Search
- Facebook's Gone Rogue; It's Time for an Open Alternative | Epicenter | Wired.com
- Google+ Identity Crisis: What's at Stake With Real Names and Privacy | Epicenter | Wired.com
- Google Settles With Feds, Apologizes (Again) For Buzz Privacy Blunder | Epicenter | Wired.com
- If You Hate Facebook... - Fox News Video - Fox News
- Public Posting Now the Default on Facebook | Epicenter | Wired.com
- Under the Gun, Facebook Relents on Privacy | Epicenter | Wired.com
- Video - Wsj.com
- Privacy - Laws-Help
- Prevent Being Tracked Online! - YouTube
- Privacy Journal
- Computer Security - Aaron's Computer Rental Chain Settles FTC Spying Charges
- Aaron's Agrees To Stop Snooping On Customers Via Rented Computers – Consumerist
- Aaron's computer rental chain settles FTC spying charges | Security & Privacy - CNET News
- Agreement Containing Consent Order - 131022aaronsorder.pdf
- Company Agrees to Stop Spying Through Rented Computers
- Complaint - 131022aaronscmpt.pdf
- I Can See You In Your Home
- Lawsuit: Aaron's Rental Co. Laptops Can Track Users' Keystrokes and Screenshots, Take Webcam Photos
- Lease to Own Furniture, Computers, Electronics, Appliances | Aaron's
- The Greatest American Lawyer: Invasion of Privacy: Aaron's Rental Company Laptops Spie on Customers
- Computer Security - All Mixed info on Computers and the Internet
- 11+ security questions to consider during an IT risk assessment - TechRepublic
- 5 best practices to improve building management systems' cybersecurity - Cabling Install
- 5 biggest security failures of 2015 and who is still at risk - TechRepublic
- 5 ways to secure OS X - TechRepublic
- 9 days: Black-hat hackers' threshold in untargeted attacks - TechRepublic
- Adobe patches Flash to quash last two zero-days unearthed in Hacking Team's cache | Computerworld
- Adobe patches vulnerabilities in ColdFusion, Flex and Flash Player, including a zero-day flaw | Computerworld
- A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients - PETS2015VPN.pdf
- A Linux botnet is launching crippling DDoS attacks at more than 150Gbps | Computerworld
- Amazon resets passwords that might have been 'exposed'
- An insider's look at iOS security - TechRepublic
- Anonymous insiders reveal real hacking risks to nuclear power plants, report | Computerworld
- Anti Virus Companies Profit in Ugly PUP Game
- Antivirus software could make your company more vulnerable | Computerworld
- Apple iOS App Store riddled with malware -- XcodeGhost haunts hundreds of apps [u3] | Computerworld
- Apple's encryption battle with the FBI is over, for now
- Are Your Hacked Details Circulating On The Internet? | Gizmo's Freeware
- A troubling trajectory of malware and ransomware targeting OS X and iOS - TechRepublic
- Backspace Flaw Enables Linux Zero-Day Attack | Software | LinuxInsider
- Baidu Android app component puts 100 million devices at risk | Computerworld
- Best Free Internet Safety Check | Gizmo's Freeware
- BitLocker encryption can be defeated with trivial Windows authentication bypass | Computerworld
- Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
- Black Hat USA 2015 | Briefings
- Burr-Feinstein Encryption Bill
- Caution - Free USB Drives
- Check Your PC For Remnants Of Hacking Team Tools | Gizmo's Freeware
- CIOs wary of sharing cyberthreat data | CIO
- Coming soon to your smart TV: The next wave of cybercrime | Computerworld
- Comodo fixes bug that led to issue of banned digital certificates | Computerworld
- Comodo SSL Affiliate | The Recent RA Compromise
- CompTIA report: Almost half of companies believe their security is 'good enough' - TechRepublic
- Congress moves quickly on cyberthreat information sharing | Computerworld
- Cookie handling in browsers can break HTTPS security | Computerworld
- Court rules Shutterfly may have violated privacy by scanning face photos | Computerworld
- Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux - darkMORE Ops
- Critical flaw in NetUSB driver leaves millions of routers vulnerable | Computerworld
- Critical flaw puts 500 million WinRAR users at risk of being pwned by unzipping a file | Computerworld
- Cybercriminals adopt just-patched zero-day Flash exploit | Computerworld
- Cybersecurity bill approved, but what does it accomplish? | Computerworld
- Data breach at toy maker VTech leaked photos of children, parents | Computerworld
- Data convenience isn't a crime, but treating it as one should be | Computerworld
- Data held hostage; backups to the rescue | Computerworld
- DDoS mitigation may leave your site vulnerable - TechRepublic
- Department of Defense - Law of War Manual (June 2015) - law-of-war-manual-june-2015.pdf
- Design flaw in Intel chips opens door to rootkits | Computerworld
- Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel - YouTube
- DOJ tightens policies on use of simulated cells for surveillance | Computerworld
- Download Older Versions of Software
- Download Older Versions Software for any Operating System
- Downloads - Rook Security
- Drupal Hardens Its Security in Response to Criticism
- Dyreza malware steals IT supply chain credentials | Computerworld
- Email Header Analyzer, RFC822 Parser - MxToolbox
- Encryption ransomware threatens Linux users — Dr.Web - innovation anti-virus security technologies. Comprehensive protection from Internet threats.
- Evil Versions of Popular Open Source Software
- Facebook to warn users about potential state-sponsored attacks | Computerworld
- Facebook was the victim of a backdoor hack
- Faux phishing scheme shows CIOs how hacks unfold | CIO
- FBI backs off Apple, finds another way into iPhone 5c
- File-encrypting ransomware starts targeting Linux Web servers | Computerworld
- Firefox helps you cover your assets with latest Tracking Protection feature - TechRepublic
- Firefox Security Warning - CVE - CVE-2015-4508
- Firewalls can't protect today's connected cars | Computerworld
- Five Tips to Avoid Tax Scams
- Former NSA and CIA director recommends managing consequences instead of vulnerabilities - TechRepublic
- F-Secure Router Checker | Is my DNS hijacked?
- Full Disclosure: WinRAR SFX v5.21 - Remote Code Execution Vulnerability
- Google researchers uncover a remote execution bug in FireEye appliances | Computerworld
- Got A Lenovo Laptop? You Need To Uninstall The Accelerator. | Gizmo's Freeware
- Hacker exploited Imgur flaw to secretly load over 450 background images and attack 8chan | Computerworld
- Hacker hijacks @Deray by redirecting his Verizon phone number
- Hacker: 'Hundreds of thousands' of vehicles are at risk of attack | Computerworld
- Hackers shut down power grid in Ukraine
- Has The Antivirus Industry Gone Mad? | Emsisoft Blog
- Has The Antivirus Industry Gone Mad? | Emsisoft Blog
- Hello Kitty hack exposes 3.3 million users, joins Hello Barbie in putting kids at risk | Computerworld
- How Adele became the latest celebrity hacking victim - TechRepublic
- How Safe Is Your Password? | BreachAlarm
- How to Check an Internet Link without Actually Clicking It | Gizmo's Freeware
- How to easily encrypt/decrypt a file in Linux with gpg - TechRepublic
- HP adds protection against firmware attacks to enterprise printers | Computerworld
- Hyatt Hotels says payment-processing systems hit by malware | Computerworld
- Improve Your Security: Check Your Router Hasn't Been Hijacked | Gizmo's Freeware
- Indegy - Our mission is to prevent industrial disasters by delivering products that defend against cyber attacks and enable operational excellence in ICS management
- Index of /tools/
- Is it time to replace passwords with passthoughts? - TechRepublic
- Is there an Internet-of-Things vigilante out there? | Communauté Symantec Connect
- Joint Chiefs of Staff emails targeted by Russian hackers | Computerworld
- JPMorgan says breach impacted 76M households and 7M small businesses | CSO Online
- Juniper Networks to rip out NSA-developed code amid new backdoor security concerns - TechRepublic
- Juniper updates list of backdoored enterprise firewall OS versions | Computerworld
- Juniper warns about spy code in firewalls | Computerworld
- Kill the hassle of password management with Google Apps SSO - TechRepublic
- LAPD hacks iPhone 5s, proves they don't need Apple backdoor - TechRepublic
- Leaked D-Link code-signing key could make malware look legit
- Let's Encrypt - Free SSL/TLS Certificates
- LifeLock pays $100M to settle FTC complaint of more false advertising | Computerworld
- Linux Grub massive flaw: Was it made by NSA in 2009? | Computerworld
- Linux Today - Drupal Hardens Its Security in Response to Criticism
- Linux Today - Mozilla Firefox 39.0.3 Hotfix Out Now to Patch a Critical Issue in the Built-in PDF Viewer
- Linux Today - TeamViewer Alternatives for Linux
- LogJam encryption flaw puts Web surfers at risk | Computerworld
- Logjam: How Diffie-Hellman Fails in Practice
- Logjam: PFS Deployment Guide
- Mac OS X ransomware: How KeRanger is a shadow of malware to come - TechRepublic
- Macs can be remotely infected with firmware malware that remains after reformatting | Computerworld
- Major attack on Cisco routers: Protect your enterprise from SYNful Knock - TechRepublic
- Make It Easier To Trace The Source Of Email | Gizmo's Freeware
- Malware goes to war: Potential tools, uses, and targets of cyberweapons - TechRepublic
- Mark Zuckerberg's lesser-known social accounts get compromised
- Microsoft Patch Tuesday: The patches keep coming | Computerworld
- Microsoft will benefit from LinkedIn's massive personal database, but privacy risks remain - TechRepublic
- Microsoft Word - Tier 1 Controls v2.docx - Tier-1-Controls-v2-2.pdf
- Microsoft Word - Whitepaper - Anatomy of the Attack Phishing.docx - Whitepaper-Anatomy-of-the-Attack-Phishing.pdf
- Millions of Android devices have flawed full disk encryption
- "Millions" Of Home Routers Vulnerable To Web Hack - Forbes
- Millions of Linux servers and PCs, 66% of Android devices vulnerable to serious 3 year old bug - TechRepublic
- Misconfiguration Exposes Hotel Routers to Risk
- Mozilla Firefox 39.0.3 Hotfix Out Now to Patch a Critical Issue in the Built-in PDF Viewer - Softpedia
- Mozilla issues quick fix for Firefox zero-day bug | Computerworld
- New attack campaign against SMBs uses a botnet to deliver PoS malware | Computerworld
- New malware infects ATMs, dispenses cash on command | Computerworld
- New remote access Trojan Trochilus used in cyberespionage operations | Computerworld
- North Korean hackers stole US fighter jet blueprints
- NSA Has Reverse-Engineered Popular Consumer Anti-Virus Software In Order To Track Users | TechCrunch
- NSA Spying on Foreign Anti-Virus Companies
- oclHashcat - advanced password recovery
- OpenSSH Flaw Exposes Linux Servers to Roaming Risk
- OpenSSH patches leak that could expose private SSH keys | Computerworld
- OPM: The worst hack of all time | Computerworld
- OPM underestimated the number of stolen fingerprints by 4.5 million | Computerworld
- Patch halt looms for half of all IE users | Computerworld
- Pawn Storm cyberspy group targets NATO, other gov't agencies | Computerworld
- Phishing Scams Lead with Fake CEO Emails
- Plenty of fish, and exploits, on dating website | Computerworld
- Probably The Most Reliable Source Of Security Patch Info | Gizmo's Freeware
- Project Zero
- Ransomware-as-a-service is exploding: Be ready to pay - TechRepublic
- Read the full Senate bill requiring encryption backdoors
- Report: 90% of mobile health and finance apps vulnerable to critical security risks - TechRepublic
- report_pubv2 - bencsathPBF11duqu.pdf
- Scan report for at UTC - VirusTotal
- Scan report for http://archive.defense.gov/pubs/law-of-war-manual-june-2015.pdf at 2015-11-25 21:24:10 UTC - VirusTotal
- Skimmers Hijack ATM Network Cables — Krebs on Security
- Software security holes
- SSH Frequently Asked Questions
- SSL/TLS/HTTPS: Keeping the public uninformed | Computerworld
- St. Louis Federal Reserve forces password change after DNS attack | Computerworld
- Tesla patches Model S after researchers hack car's software | Computerworld
- The anatomy of a DDoS extortion attempt - TechRepublic
- The Daily Dot (dailydot) 24 uploads | Scribd
- The Dark Arts: Hacking Humans | Hackaday
- The dark side of wearables: How they're secretly jeopardizing your security and privacy - TechRepublic
- The Juniper VPN backdoor: Buggy code with a dose of shady NSA crypto | Computerworld
- The myth of the cybersecurity skills shortage | Computerworld
- The NSA wants to spy on the Internet of Things
- The Risk of Open WiFi on Display at RSA
- Thousands of Java applications vulnerable to nine-month-old exploit | Computerworld
- Thousands of medical devices are vulnerable to hacking, security researchers say | Computerworld
- Three indicted in JPMorgan hacking case | Computerworld
- Top 10 security stories of 2015 | CIO
- Twitter 'confident' that 32 million usernames weren't hacked
- Unlike Mozilla, Google anticipated SHA-1 errors from HTTPS traffic inspection systems | Computerworld
- URL spoofing in reader mode — Mozilla
- Ways $460 million military contract for cyber bombs could attack targets | Computerworld
- Website Password hacking using WireShark - blackMORE Ops
- Why citizens need encryption as a fundamental human right - TechRepublic
- Why Linux Distros Look Insecure Even Though They're Not | FOSS Force
- Why the Linux Mint hack is an indicator of a larger problem - TechRepublic
- Why the NSA may not need backdoors - TechRepublic
- Windows vulnerability can compromise credentials | Computerworld
- Wireshark makes locating bandwidth issues easy - TechRepublic
- XcodeGhost used unprecedented infection strategy against Apple | Computerworld
- Your 4-step DDoS attack protection plan: What you can learn from Protonmail attack - TechRepublic
- Zero-Day Exploit Found in Kaspersky Antivirus - UPDATED - Softpedia
- CYBERTHREAT REAL-TIME MAP - Kepersky MAP
- Untangling the NSA's latest alleged embarrassment
- Distributed Censorship or Extortion? The IoT vs Brian Krebs | Hackaday
- Insulin Pump Can be Hacked: Johnson & Johnson
- The FCC wants ISPs to get permission before sharing your data
- ICYMI: Airbag helmets might save your noggin
- Why the Internet fell apart today
- Routers, The Internet & YouTube Offline - Computerphile - YouTube
- DonsDeals Blog: Why did the Internet Fall Apart Today? - Early Today (10-21-16) Some party unleashed a massive DDoS attack against Dyn, a major DNS Host
- Teen arrested for sharing exploit that almost brought down 911
- Joomla websites attacked en masse using recently patched exploits | CSO Online
- Netflix taunts ad blocking crowd with 'Black Mirror' ads
- US bank authority warns of data breach that took 10,000 records
- AT&T May Be Spying On U.S. Citizens For Profit | Digital Trends
- LinkedIn is on the Verge of Being Banned in Russia | Digital Trends
- Microsoft to open two Azure data centers solely for US Department of Defense as it woos government contracts – WinBeta
- Illumio Introduces Security Templates to Shut Down Existing Security Gaps Inside Data Centers and
- Product Demo: Illumio Security Templates - YouTube
- DonsDeals Blog: Eaton EPRI is field testing intelligent Circuit Breakers for Smart Grid Utilities - Energy Management Circuit Breaker
- 28c3: Defending mobile phones - YouTube
- Yahoo confirms new security breach affecting over one billion accounts
- eSecurity Planet
- Get This 1000-Page Book For Free | Gizmo's Freeware
- Security Engineering - A Guide to Building Dependable Distributed Systems
- Security Engineering - The Book - SEv1.pdf
- DonsDeals Blog: Computer Securtiry info links 01-01-17 - Re New message from a Facebook Friend
- IBM Details Risks of Second-Hand IoT Devices and Connected Cars
- Cloudbleed — Your Credentials Cached in Search Engines | Hackaday
- Incident report on memory leak caused by Cloudflare parser bug
- Survey finds 25% of healthcare organizations put patient data at risk in the public cloud - Cabling Install
- Critical security flaws found in LastPass on Chrome, Firefox
- DoubleAgent: Zero-Day Code Injection and Persistence Technique | Cybellum
- From XP to 10, DoubleAgent pwns all your Windows? | Hackaday
- 'Shadow Brokers' give away more NSA hacking tools
- Have I been pwned? Check if your email has been compromised in a data breach
- Is My Password Safe? Practices for People Who Know Better | Hackaday
- Are your sensors spying on you? - YouTube
- Your phone's motion sensors can give away PINs and passwords
- Computer Security - Congress Targets Cybersecurity and you're the Victim
- EFF Disappointed as CISA Passes Senate | Electronic Frontier Foundation
- GetFile
- John Brennan email hacked, U.S. investigates - CNNPolitics.com
- Teen says he hacked CIA director's AOL account | New York Post
- Computer Security - Sony Apologizes Offers $1 Million Insurance After Hacking
- Ernst Interview on Sony Data Breach, May 3 - Video - Bloomberg
- Technology news, comment and analysis | Technology | guardian.co.uk
- Torrenzano Interview on Sony Data Breaches, May 4 - Video - Bloomberg
- Computer Security - Tesco Bank breached: Money stolen from 20,000 accounts
- Tesco Bank breached: Money stolen from 20,000 accounts
- Message for Current Account customers - Your Community - Tesco Bank
- TalkTalk loses over 100,000 customers following hack
- TalkTalk fined £400K for mistakes that led to 2015 hack
- Tesco Bank breached - Google Search
- Thousands of Tesco Bank accounts compromised by fraud | Money | The Guardian
- Tesco Bank breached - Google Search
- Tesco Bank blocks customer bank cards after 'suspicious activity' prevents woman from feeding childr - YouTube
- Tesco Bank: 20,000 customers lose money - BBC News
- Computer Security Bulletins Windows and Mac
- About the security content of Mac OS X v10.6.6
- Microsoft misses flaw in 2010 patch that was supposed to quash Stuxnet bug | Computerworld
- Microsoft releases emergency patch to stymie Windows Server attacks | Computerworld
- Microsoft Security Bulletin MS11-001 - Important: Vulnerability in Windows Backup Manager Could Allow Remote Code Execution (2478935)
- Microsoft Security Bulletin MS11-002 - Critical: Vulnerabilities in Microsoft Data Access Components Could Allow Remote Code Execution (2451910)
- Microsoft Security Bulletin MS14-068 - Critical
- Computer Security Software - 75 Open Source Apps To Replace Popular Security and Related Type Software
- 75 Open Source Apps To Replace Popular Security Software - Datamation
- 75 Open Source Apps To Replace Popular Security Software : Page 2 - Datamation
- 75 Open Source Apps To Replace Popular Security Software : Page 3 - Datamation
- 75 Open Source Apps To Replace Popular Security Software : Page 4 - Datamation
- BackTrack Linux - Penetration Testing Distribution
- Cisco Search Results
- Email Gateway
- EnGarde Secure Linux :: Welcome!
- John the Ripper password cracker
- License - Email Gateway
- m0n0wall - Hardware
- pfSense Open Source Firewall Distribution - Home
- Tails - Download, verify and install
- Tails - Download, verify and install
- Whonix / Documentation / Features
- Whonix / Documentation / Home
- Computer Secutiry and Privacy Online
- Privacy and security – The Internet Health Report
- Consumer Protection
- Focus Factor, V-Factor Promoters to Pay $1 Million for False Claims
- Looks Too Good To be True - Consumer Alert!
- Looks Too Good To be True - Welcome!
- Rip Off ReportBetter Business Bureau or Buyer Better Beware BBB ............Nationwide Alert! ........... THE FOX GUARDING TH
- Virus all info, Linux, Windows and Mac
- 'Neverquest' trojan threatens online banking users - Computerworld
- A First Look at the Target Intrusion, Malware — Krebs on Security
- A3 : Flux Research Group
- Abusing JSONP with Rosetta Flash
- Adobe - Security Bulletins: APSB11-25 - Security update available for Flex SDK
- Adobe FAIL: Yet another Flash 0-day vuln 'sploited in wild | Computerworld
- Adobe patches critical flaws in Flash Player and AIR - Computerworld
- Adobe Releases Fix for Two Shockwave Player Vulnerabilities | Digital Trends
- All CoinVault and Bitcryptor ransomware victims can now recover their files for free | Computerworld
- Anti-rootkit utility TDSSKiller
- Anti-rootkit utility TDSSKiller
- Antivirus scan for 5cb14d0745d7b09bcbeba3114cc06c5f at UTC - VirusTotal
- Antivirus scan for 90d519d99771363325b6bc5c7e9a9a6e5b8e04092053d24fa362aca6e33523f8 at UTC - VirusTotal
- Antivirus scan for aca4fc340cb1530ec41ddddc832833dd0d777d7d44f1b66205675d6f8ec29197 at UTC - VirusTotal
- Apple patches OS X to protect against POODLE | Computerworld
- aswMBR
- AVAST 2014 | Download Free Antivirus Software for Virus Protection
- AVAST 2014 | Download Free Antivirus Software for Virus Protection
- avast! blog » Linux Trojan "Hand of Thief" ungloved
- avast! Linux Home Edition
- Award-winning antivirus software for all your devices | F-Secure
- Best Free Antivirus Software
- Best Free Antivirus Software
- Best Free Antivirus Software
- Best Free Antivirus Software
- Best Free Antivirus Software - Gizmo's Freeware 03-31-16 (Read the Comments here and in my ScrapBook there are Big Problems in Windows Systems Breaking Apps with number 1 Qihoo 360 Total Security
- Best Free Antivirus Software | Gizmo's Freeware
- Best Free Intrusion Prevention and Detection Utility for Home Use (HIPS)
- Best Free Rootkit Scanner and Remover
- Best Free Rootkit Scanner and Remover
- Best Free Rootkit Scanner and Remover
- Best Free Rootkit Scanner and Remover
- Best Security List - Google Custom Search on DonsDeals Blog
- best security list 2013 - Search on DonsDeals Blog
- best secutriy list - Google Custom Search on DonsDeals Blog
- Bug bounty program outs 7-month-old IE zero-day - Computerworld
- cd00r - Google Search
- cD00r Knocking backdoor (improved) | Fun Over IP
- Check your PC!
- CISOfy - Security Auditing and Compliance Solutions
- Clam AntiVirus
- Clam AntiVirus
- ClamWin CD/USB - HowTo
- Clean-slate design of Resilient Adaptive Secure Hosts (CRASH)
- COMMUNITY - Free access - CLOUD ANTIVIRUS
- Comodo - Google Search
- Computer worm - Wikipedia, the free encyclopedia
- crafted.win32file.ols - Google Search
- CrowdStrike: HTTP iframe Injecting Linux Rootkit
- CryptoLocker - Wikipedia, the free encyclopedia
- CryptoLocker - Wikipedia, the free encyclopedia
- CryptoLocker Encryption Cracked. How To Get Your Files Back.
- Cryzip Ransomware Trojan Analysis
- Cyberspies Posing As Hacktivists Waged Cyberattacks To Steal South Korean, U.S. Military Intel
- DEFCON 16: Malware RCE: Debuggers and Decryptor Development - YouTube
- Dojo | Dojo-labs
- DonsDeals: Avast! AntiVirus For Both Window and Linux Home Edition
- DonsDeals: BBC NEWS | Programmes | Click | BBC team exposes cyber crime risk
- DonsDeals: Best Free Rootkit Scanner/Remover
- DonsDeals: Conficker Worm Called An Epidemic
- DonsDeals: CrowdStrike - HTTP iframe Injecting Linux Rootkit (Vrius info)
- DonsDeals: Download Comodo System-Cleaner
- DonsDeals: Facebook Users Targeted By Fake Virus Alert
- DonsDeals: Firewall & Antivirus Software Suite - Internet Security | Comodo
- DonsDeals: Free Agent: Linux Firewalls and Antivirus--Needed or Not? - PCWorld
- DonsDeals: Free Desktop PC Security - Free Downloads Keep your PC Safe | Comodo
- DonsDeals: Jotti's malware scan
- DonsDeals: Linux users be Aware of this Trojan - Hand of Thief malware could be dangerous (if you install it) - TechRepublic
- DonsDeals: M86 Security Finds URL Filters Anti Virus Scanners Ineffective
- DonsDeals: New Kneber Botnet Tied To 75 000 Systems
- DonsDeals: PC Hell: Free RootKit Removal Tools and Software
- DonsDeals: Privacy = Security and Security = Privacy...
- DonsDeals: Probably the best free security list in the world
- DonsDeals: Probably the Best Free Security List in the World
- DonsDeals: Probably the Best Free Security List in the World - Updated 28. August 2012
- DonsDeals: Re: Viruses now penetrating deeper | Tech News on ZDNet
- DonsDeals: Setting up Avast Antivirus to Protect your Windows PC...
- DonsDeals: TDL4 MBR Rootkit Virus Alureon TDSS Removal by Britec - YouTube
- DonsDeals: The first Linux botnet? | ITworld
- DonsDeals: There are Viruses, Trojans, Worms and Rootkits, that can infect a Linux OS
- DonsDeals: Trinityhome : New TRK 3.4: easier than ever before
- DonsDeals: Updated Conficker Ropes Victims into Rogue Antivirus Scam
- Download Enhanced Mitigation Experience Toolkit 4.1 from Official Microsoft Download Center
- download rescue iso - Search results on kapersky.com
- Download RogueKiller (Official website)
- Download System-Cleaner
- Dr.Web Virusscan [CureIt!]
- Edit - Nimbus Screen Capture
- EMET mitigations guidelines
- Empathy | Michal Strehovský: home
- Exabeam handles security threats in real time with user behavior intelligence - TechRepublic
- Exabeam Unveils User Behavior Intelligence Platform, Delivers Future of Cyberattack Detection and Response - Exabeam
- Fake Antivirus Targets Firefox | PCWorld
- FAQ - VirusTotal
- File scan results from Metascan Online | Free virus scanning tool
- File scan results from Metascan Online | Free virus scanning tool
- File scan results from Metascan Online | Free virus scanning tool
- FireEye - Fox IT Scanner
- Firewall & Antivirus Software Suite - Internet Security | Comodo
- Firewall | Download Free Firewall Software From Comodo
- Five free anti-malware products to safeguard your PC - TechRepublic
- Flash-based vulnerability lingers on many websites three years later | Computerworld
- Flex Security Issue APSB11-25
- Free AntiVirus & Anti-Rootkit & Anti-Malware | Free Web Filtering | Free VPN | Free IPSec | Free FortiClient
- Free Antivirus | Download Free Virus Protection Software from Comodo
- Free Antivirus for Windows - Open source GPL virus scanner
- Free Antivirus Software - Download Bitdefender Antivirus Free
- Free Ransomware Decryption Utilities | Gizmo's Freeware
- Free Virus Scan, Free Virus Protection, Antivirus Software | McAfee Security Scan
- Free Windows Desktop Software Security List - My Choices | Gizmo's Freeware
- Free Windows Desktop Software Security List | Gizmo's Freeware
- Get Started with Lynis - Installation Guide
- GHOST glibc Linux Remote Code Execution Vulnerability | Threatpost | The first stop for security news
- git-public.flux.utah.edu Git - a3/demo-scripts.git/summary
- Gizmo's - Best Free Intrusion Prevention and Detection Utility for Home Use (HIPS) | Gizmo's Freeware
- GMER - Rootkit Detector and Remover
- Google Translate - http://www.chkrootkit.org/download.htm
- Google, Microsoft and Instagram rush to fix Flash flaw that could steal your data
- Greatdanepro.com | Safety: Currently Safe. Social: 10/10 | AVG Threat Labs
- Hand of a Thief malware targets Linux users' bank accounts | Apps and Software | Geek.com
- Hand of Thief malware could be dangerous (if you install it) - TechRepublic
- Heartbleed was just the beginning as more vulnerabilities appear - TechRepublic
- How "omnipotent" hackers tied to NSA hid for 14 years—and were found at last | Ars Technica
- How do you tell if your computer has a virus
- How to create a Kaspersky Rescue Disk using Kaspersky Internet Security 2014
- How to Detect Rootkits on a Computer | eHow.com
- How to Install and Use Linux Malware Detect (LMD) with ClamAV as Antivirus Engine
- How to integrate ClamAV into PureFTPd for virus scanning on CentOS 7
- How to Protect Your Linksys Router from TheMoon Malware | Digital Trends
- How to record Kaspersky Rescue Disk 10 to a CD/DVD and boot my computer from the disk?
- How to record Kaspersky Rescue Disk 10 to a USB device and boot a computer from it
- How to secure your ISPConfig 3 server against the poodle SSL attack | HowtoForge - Linux Howtos and Tutorials
- How to start a virus scan using Kaspersky Rescue Disk
- How to update anti-virus database of Kaspersky Rescue Disk 10
- How to update Kaspersky Rescue Disk 10 databases using an update utility?
- IE10 under attack as hackers exploit zero-day bug - Computerworld
- Index of ftp://ftp.f-secure.com/anti-virus/tools/beta/
- Jamesturner.ca | Safety: Active Threats!. | AVG Threat Labs
- Java gets sneaky with Ask Toolbar piggyback install | WindowsObserver.com
- Jotti's malware scan
- Kaspersky Rescue Disk 10
- KlamAV - ClamAV for KDE | Free Development software downloads at SourceForge.net
- klamav - Google Search
- KlamAV GUI Screen Animation
- Linux Today - Hand of a Thief malware targets Linux users' bank accounts
- Linux Virus - Google Custom Search on DonsDeals Blog
- Lynis
- Malware developers hide in plain sight in online sandboxes - TechRepublic
- Malware in Ad Networks Infects Visitors and Jeopardizes Brands
- Massive botnet takedown stops spread of Cryptolocker ransomware - Computerworld
- McAfee Security Scan Plus | McAfee Free Tools
- Metascan Online | Free file scanning with multiple antivirus engines
- Microsoft misses Windows bug, hackers slip past patch | Computerworld
- Microsoft plans monster security update for next week | Computerworld
- Microsoft Rushes to Fix Browser After Attacks; No Fix for XP Users - NYTimes.com
- Microsoft tells Windows 10 users to uninstall Office | Computerworld
- More than 30 vulnerabilities found in Google App Engine | Computerworld
- Mytob - Google Search
- Network Security – Virus Alerts | McAfee Threat Center
- Neverquest banking malware more dangerous than Zeus trojan - TechRepublic
- Neverquest Trojan: Built to Steal from Hundreds of Banks | We use words to save the world | Kaspersky Lab Official Blog
- New Flavor of Ransomware Is More User Friendly
- New Linux Rootkit Emerges | threatpost
- New Malware Targets Linksys Routers
- New OS X Ransomware KeRanger Infected Transmission BitTorrent Client Installer - Palo Alto Networks BlogPalo Alto Networks Blog
- News | VirusBlokAda
- North Korea's official news website serves malware | Computerworld
- Online banking faces a new threat - Securelist
- online virus scan file upload - Google Search
- Oracle_VM_VirtualBox_Extension_Pack-4.0.0-69151.vbox-extpack MD5:9ca47480f5b6339a607320c02529c02c - VirSCAN.org Scanners did not find malware!
- Outpost Security Suite FREE — The first Free Complete Internet Security Suite
- Panda Cloud Antivirus – Download the best free antivirus and the first free antivirus from the cloud
- Patch alert: Update browsers' Flash ASAP to block log-on theft - Computerworld
- PATCH NOW: NTP vulns remotely exploitable. Sploits in wild already | Computerworld
- Patch Tuesday updates aim for Exchange and Explorer flaws | Computerworld
- PC Security, PC Internet Security, Free Desktop PC Security Protection
- Powerful Free Microsoft Security Tool EMET has Been Updated
- Powerful Free Microsoft Security Tool EMET Now in Version 4.1 Update
- Probably the Best Free Security List in the World