Researchers at CyberWarZone found information about a new Facebook scam involving singer Nicki Minaj and a supposed sextape.
Facebook scams have been around for a while, and usually advertise pornography and/or other illicit material.
Emma Watson—the actor who portrayed Hermoine Granger in the Harry Potter films—has been involved in numerous Facebook scams, so much in fact that former NakedSecurity writer Graham Cluley has written a blog solely on this topic.
However, this scam has found a different target: Nicki Minaj. The scam advertises a sextape featuring Minaj that was supposedly leaked by an angry ex-boyfriend.
The sextape is of course a fake, and uses an image from the saucy music video ‘High School’ to allure visitors. The link redirects users to ihatenickinow.blogspot.com, where visitors are told to complete a ‘test’ (survey) to watch the adult-rated content.
These scams are numerous, and this one actually isn’t the first featuring Minaj. In fact, there is an entire Facebook page titled ‘Nicki Minaj Leaked Sextape’ that advertises a similar scam.
Nicki Minaj Leaked Sextape page on Facebook
We advise our users to stay away from these sort of scams, which could potentially lead to malware infections or other potentially unwanted programs (PUPs).
Joshua Cannell is a Malware Intelligence Analyst at Malwarebytes where he performs research and in-depth analysis on current malware threats. He has over 5 years of experience working with US defense intelligence agencies where he analyzed malware and developed defense strategies through reverse engineering techniques. His articles on the Unpacked blog feature the latest news in malware as well as full-length technical analysis. Follow him on Twitter @joshcannell
For 18 months, Malwarebytes Unpacked has been bringing readers like you news about the latest cyber threats, in-depth analysis of malware and scams, and advice on keeping yourself safe online.
We have grown our team, our purview, our audience and appreciate every single reader for giving us a little bit of their time for the sake of security.
Therefore, to commemorate our time of security blogging, we’ve completely redesigning our blog, Malwarebytes Unpacked!
Bitcoin, the famous digital currency which has sparked much controversy over the years, is now heading to an ATM near you. The world’s first Bitcoin ATM operated by Nevada-based Robocoin and Canadian Bitcoiniacs is set to open today in Vancouver, BC.
To comply with Canadian law, anyone wanting to use the ATM will have to verify their identity by allowing palm-print and photographic scans.
The ATM will trade Canadian dollars in exchange for Bitcoins for a maximum of $3,000 per day.
Screenshots courtesy of https://robocoinkiosk.com/
We have been hearing complaints that Malwarebytes Anti-Malware comes with a bunch of useless stuff.
For the sake of thoroughness, I inquired if we had any “bundling” offers. The email reply I received consisted of one word: NEVER.
Let me explain, bundles are an amalgamation of programs usually riding the coattails of one more desirable program in the hope of also being installed.
Bundlers are almost never a bundle of joy.
If you do a search for a term in Google, the very top results are not organic, they are paid for. They are encased in a beige box. That is the visual cue that is supposed to tell you that these results have been PAID for.
There is a much better description here, straight from the horses mouth.
This is perfectly legitimate but sometimes unscrupulous people try to take advantage of it.
For example, if you do a search for Malwarebytes in Google, the second top paid result is a Google adword campaign by SofTango.
Too often I see people waving their smart phones around trying connecting to any wireless access point.
The high cost of cellular data plans and a desire for free internet access will do that to people.
This may sound obvious to those who work in the security field, but many people do not always know where their mobile device is connecting to.
There is a convenience setting on both iOS and Android allowing your smartphone to automatically connect to known networks.
On iOS it is: Ask to Join Networks. On Android it is: Auto-Connect Wi-Fi. Both mobile operating systems are set this way by default.
This is a nice feature, if you approach it from the perspective of convenience.
From a security standpoint, this feature can be abused — you could be connected to a rogue access point where all your info can be accessed by a third party.