Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor

Network Bandwidth Monitor
NBMonitor displays real-time details about your network connections & bandwidth usage.

   
Network Access Monitoring

Network Access Monitoring
ShareAlarmPro monitors network access to shared folders and resources.

   
Product Key Finder
Product Key Finder

Product Key Explorer retrieves over 800 software product keys from network computers.
   
Network Shares Monitoring

Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy.

 
 

Network Security News

Scareware cybercriminals hit upon lucrative scam

Wednesday, March 25, 2009

Cybercriminals who post fake websites that promote phony antivirus software have perfected the scam to a point where some are raking in as much as $10,000 daily from partners selling the bogus software, according to a web security report.

According to a report released Tuesday by web security researchers, cybercriminals have been using search engine optimization tools to drive increasing amounts of traffic to websites that redirect users to pages for buying antivirus software.

Researchers said they tracked cybercriminal activity through a malware server that led them to discover how the hackers were able to insert parasite pages on legitimate sites.

After search engines indexed the cybercriminals’ phony pages, they were displayed as top search results. The phony pages redirect anyone who clicked on them to a website selling rogue antivirus software.

Partners in the scam paid hackers 9.6 cents per redirection to the software-selling websites, researchers reported. Researchers observed 1.8 million unique user redirections in 16 consecutive days, according to the report.

Although less than 2 percent of redirected users paid $50 for the scam software, the software sellers paid $172,000, equal to $10,800 per day, to the cybercriminals who set up the fake pages.


View more news

 
  Most Popular
. Computer Security

. Ethical Hacking

. Windows 7: the untold story of how the enterprise gets snubbed

. Open source identity: Linux founder Linus Torvalds

. FAQ: How to protect your PC against the Downadup worm

. Brocade's new CTO takes aim at Cisco

. Heartland tries to rally industry in wake of data breach

. IBM confirms layoffs

. Apple puts iPhone Nano and Netbook rumors to rest

. Microsoft 'can't imagine' PS3 catching up to Xbox 360
 
 
  Popular Searches
 
 
 

 

Sponsored Links
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

BlueAuditor - Monitor YourBluetooth Network
BlueAuditor detects and monitors Bluetooth devices in a wireless network and allows network administrators to audit wireless networks against security vulnerabilities associated with the use of Bluetooth devices. For more information, please visit:
nsauditor.com/bluetooth_network_scanner.html