Antivirus

Keeping the web safe – It’s more difficult than you think

Psst. Looking for some “white plastic?” If you are, then you’re trucking in ivory, the sale of which is illegal in many countries and U.S. states. “White plastic,” “jelly,” “yellow materials” are all code words used by online “marketers” of ivory, as they attempt to hide the illegal nature of what they are doing.The use…


Psst. Looking for some “white plastic?” If you are, then you’re trucking in ivory, the sale of which is illegal in many countries and U.S. states. “White plastic,” “jelly,” “yellow materials” are all code words used by online “marketers” of ivory, as they attempt to hide the illegal nature of what they are doing.

The use of code words is just one method crooks and scammers use to sell their products and hide in plain sight from authorities, using the resources of the internet, from search engines to payment systems.

The “hiding” part is what should worry us; by burying themselves in the hundreds of thousands of e-commerce sites out there, bad actors are able to peddle drugs, guns, child pornography, and many other illicit, illegal, and dangerous things that they can find markets for. And their potential customer base on the surface web is much greater than on the dark web, with customers on the former using common payment methods to pay for their goods, as opposed to the cryptocurrencies usually required to do business on the latter.

  • Nearly 620 million stolen accounts for sale on dark web
  • Bitcoin’s slipping as dark web looks to crown a new king of the cryptocurrencies
  • 35 million voter records sold on the Dark Web

Stopping this is important; what if it was one of our kids who got hooked on opioids, for example, because a friend who introduced them to drugs was able to easily obtain them online, using their parents’ credit card?

How crooks hijacked the web

In the ivory sale scam, sellers take out banner ads and text ads featuring their code words, enabling those seeking these illicit goods to find them using standard search engines, according to an organization called Traffic, which seeks to curb illegal trade in wildlife. According to the group, dozens of sites are selling illegal wildlife products including ivory, rhino horn, tiger bone, hawksbill shells, and pangolin scales, all using code wo

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

The Main Street Tech Report: Microsoft Says Third Party Antivirus Software Is No Longer Needed

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports
Read More

Continue Reading
Antivirus

Researchers warn Microsoft Defender vulnerability is already being exploited

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…
Read More

Continue Reading
Antivirus

Signed software abused to deploy antivirus-killing scripts

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …
Read More

Continue Reading
Antivirus

Stop falling for scams when Norton’s antivirus software is 70% off right now

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…
Read More

Continue Reading