ASUS Strix GeForce GTX 970
MSI GE60 2PE
Transcend StoreJet 35U3
How Microsoft Azure leapfrogs backup with cloud snapshots
Here are 5 ways to get a OnePlus One invite In India
First Impressions: Xiaomi Redmi Note
How offline retailers can make a comeback
Preview: Digit December 2014 Collector’s Edition
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Mobile videos becoming mainstream among mobile Internet users: Vuclip
Wickedleak Wammy One octa-core phone launched at Rs. 7990
RCom launches Pro 3 data network, promises speeds up to 17Mbps
Meizu MX4 with Ubuntu to launch next year
Google introduces smart spoon to prevent spilling
HP EliteBook 1040 G1
Obi Alligator S454
Intex Aqua V4
Huawei Ascend P7
Micromax Bolt AD4500
Case Study: Building an award winning multi-touch enabled music app
Case Study: Developing a Health App for Windows 8
Case Study: Developing an augmented reality app for Intel based devices
Use Spotify, Netflix in India on your PC, Android smartphone
Overview: Implementing fast real-time GPU-based image blur algorithms
A close look at Apple iPhone 6 Plus
Android 5.0 Lollipop Update
Nokia Lumia 730 Review
How to upgrade your laptop or ultrabook's hard drive to an mSATA or M.2 SSD
Jolla Smartphone Review
Top Black Friday deals for those with U.S. connections
17 must have apps for any Android device (plus alternatives)
The 10 best compact, easy to use smartphones that you can buy today
Hands On: Microsoft Lumia 535 slideshow
The Batmobile: The 7 best variants over 70 years
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Acer Aspire E5Intel Core i7 Processor, Windows 8.1 , 12 GB RAM, 1TB Hard Disk Space, 2GB GraphicsClick to know more
How to Develop 3D Games for WindowsHow to develop a soccer penalties shootout game with Microsoft Visual Studio 3D Starter Kit
Click to know more
Trend Micro has spotted a malware sample, TSPY_MINOCDO.A, which targets Facebook users. The malware redirects users to a spoofed page of the social network and claims to be part of the site's security check feature, even showing the tagline “Security checks help keep Facebook trustworthy and free of spam”.
The malware redirects all traffic to facebook.com and www.facebook.com to the system itself using the victim machine's HOST file. This ensures user can never access the legitimate Facebook pagesm and at the same time the malware spies all the browser activity and redirect the victim to the malicious site.
Trend Micro says users may fall victim to the malware by taking the 'security check' for face value. Affected users may end up relaying their details, and exposing their credit card credentials to 'cybercriminal infiltration'.
“Upon further analysis, we also discovered that the malware performs DNS queries to several domain names. What this means that the people behind this are prepared for server malfunction and has a backup to continue stealing information,” says the security firm in a blog post.