Offshore Outsourcing & Scammer

Blog about offshore outsourcing and scammer in the outsourcing industry

Phishing e-mails with instructions of the boss often successfully

PhishingPhishing emails are becoming more sophisticated. Thus, there are camouflaged mails from the boss to his employees, to transfer funds, which are highly successful.

Phishing emails are not only getting better disguised, but the attackers also always use bolder methods to reach their destination. Bosses are often pushed to reach the goal.

In the well-camouflaged phishing e-mails employees will be asked to transfer money because certain contracts have not yet been settled financially. Many employees would transfer the money instead of asking the boss once again if there everything is all right - or to look at the header of the mail more in detail.

Because is immediately visible in the header of the e-mail that the mail was not sent by the boss himself, but by a "non-corporate" e-mail address. But even these email addresses are now better camouflage than before and are similar to those of the bosses in most cases. The domains linked in the e-mail body and lead to the transfer portal, mostly resemble those of the real company address very strong. Who does not look exactly could really fall for this trick.


Facebook profiles in danger: Beware of fake warnings

FacebookOnce more Facebook users must be careful that their account does not fall into the hands of fraudsters. The warning of a friend turns out to be dangerous gateway.

Spam, viruses and Trojans on Facebook are already on the agenda for a long time. Many users have got it already. This increased the alertness at the present.  Scammers are taking advance of this alertness for taking over user accounts in masses. There are currently fake warnings of real Facebook friends in circulation, indicating the user that a copied second profile of themselves and other images are to be found in other sections on Facebook.

Phishing attack

In some cases, the scammers even have added a screenshot of the copied second profile page (not logged in). In any case, the user will be prompted to enter the link to the alleged fake profile. However, this does not lead to Facebook, but to a well-camouflaged Facebook phishing page. Who logs in on this page will tell his username and password to the scammers.

This thus have access to the entire Facebook profile and all the friends. The scammers take advantage of the fact apparently immediately to move more potential victims with the same mesh for getting their login information. Despite the fact that the news are coming from actual Facebook friends (whose accounts have already been affected), there is something what should let your alarm bells ringing.

Check URL

That is the phishing link is not pointing to, it is in the current pointing to the URL Such links should better even not get clicked. The attack also targets in other countries. Some grammatical errors, however, point out that the scammers have obviously not perfect knowledge of the language.

Who gets suspicious, you should report the relevant user profiles and alert the Facebook friends through other channels (email, phone) that presumably with their account something is not right. Who has the suspicion that the own account was hacked, be sure to change the password on Facebook and for other services, where the same log-in information is used. To impede unauthorized access to your own Facebook profile from the outset, Facebook offers a range of security settings such as two-way authentication and notifications.


360 Total Security - powerful and free of charge

"360 Total Security" is a free security suite of China company Qihu (also called Qihoo), which will protect your PC from viruses, trojans, other emerging threats from the network and ensures better performance of your system.

QihooThe essential component is the virus scanner: With up to five different engines - including the Bitdefender and Avira. Real-time protection ensures that harmful files not reach your computer.

Whether you are shopping online, downloading files or chatting with your friends you can be sure that 360 Total Security is there to keep you safe and your computer optimized. Clean-up utility is just one click away to keep your PC in optimal condition.


  • Virus Scan
    Integrating award winning antivirus engines from 360 Cloud Engine,360 QVMII, Avira and Bitdefender to provide you with the ultimate in Virus detection and protection capabilities.

  • Protection
    Protection offers 4 different user selectable modes - Performance/Balanced/Security and Custom. Each mode offers a different level of protection from malware, phishing attacks and backdoors.

  • Cleanup
    Cleanup frees your disk space by removing junk files and plugin which can improve system performance - With cleanup you can decide which areas and files to clean.

  • Speedup
    Manage and optimize your system services, boot up items and plugins - Shorten your boot time and get going sooner!


You can download 360 Total Security from



Bios vulnerabilities: Researchers see millions of computers at risk

Bios Chip"How Many Would You Like To BIOSes million Infect?" Is the dramatic title that security researchers Xeno Kopvah and Corey Kallenberg have chosen for her recent lecture. The speech is so threatened by millions of computers.

At a conference in Vancouver the two security researchers have warned of gaps in the BIOS of many computers. The manufacturers concerned are already working on updates - but it is anticipated that the little will bring.

"Because people do not update their bios, there are vulnerabilities that have been known in recent years, still," citing the "Wired" Xeno Kopvah. On the website of the researchers is, the probability is high that the majority of systems that are currently used, is at risk of at least one vulnerability.

Until now it was already assumed that intelligence Bios exploit vulnerabilities to attack. In the In-house order catalog of the department ANT, there are malicious programs that also nest in the bios. They work even further if the hard disk is deleted and a new operating system will be kept up.

Kopvahs and Kalle's discovery now shows that not only secret services with a billion $ budget is able to spy on computer thanks Bios vulnerabilities.

The two have developed a malicious program called Light Eater, with which the firmware can be manipulated on computers from Gigabyte, Acer, MSI, HP and Asus - at least in theory. The researchers have so far only as examples carried out some attacks; their software is used for testing purposes.

If the BIOS have certain weaknesses then Light Eater allows entering the System Management Mode of computers. If once it has infiltrated the code on the flash memory, then the code of the BIOS can override according their wishes. Computers from different manufacturers are under threat, because companies often use similar code elements.

The researchers describe two ways to exploit the BIOS vulnerabilities, including an attack remotely, is sent to the attack code, for example by phishing e-mail. Uncomplicated is the procedure for a physical access to the device.

Kopvah and Kallenberg declared loudly "Wired", that they sometimes manipulated a BIOS in two minutes for their purposes. In one test, it has the team apparently also managed to capture data from a computer that is running Tails - that is those Linux distribution, the whistleblower Edward Snowden recommends for secure communication.

The researchers have notified the affected manufacturers, who are already working on updates. However, the crucial question will be: “How many users actually will install these updates at the end”.