phishing
What makes phishing emails so successful?
According to the results of a study performed by researchers from the University at Buffalo, “information-rich” emails that alter the recipients’ cognitive …
Phish out WPA networks’ password with Wifiphisher
Greek computer geek George Chatzisofroniou has released a stable version of Wifiphisher, a tool aimed at automating phishing attacks against WPA networks in order to discover …
ICANN systems breached via spear-phishing emails
As many organizations before it, the Internet Corporation for Assigned Names and Numbers (ICANN) has been compromised after some of its employees fell for cleverly constructed …
Hackers hit execs for insider info to gain stock market advantage
FireEye’s researchers have identified yet another hacking group. Dubbed FIN4, the hacking crew seems to be comprised of native English speakers with “deep …
Darkhotel espionage campaign targets corporate executives traveling abroad
Kaspersky Lab researched the Darkhotel espionage campaign, which has lurked in the shadows for at least four years while stealing sensitive data from selected corporate …
Brazilian, Chinese govt sites host the most phishing pages
Occasionally, cyber crooks compromise websites administered by governments and make them host phishing pages. But how often does that happen? Cyvveillance researchers have …
New technique makes phishing sites easier to create, more difficult to spot
Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form. …
Most orgs unprepared to handle a cyber incident
In the latest quarter, Solutionary SERT performed a broad analysis of the threat landscape, including information on the Shellshock and Aftershock vulnerabilities present in …
246 percent spike in Apple-themed phishing scams
Phishing scams targeting Apple users saw a dramatic upswing in Q3 of this year. Compared to Q1 2014, Apple users faced a 246% increase in the attacks that masquerade as a …
APWG launches global cybercrime reporting program
The Anti-Phishing Working Group (APWG) announced the establishment of an open-access cybercrime reporting program to speed the collection and redistribution of cybercrime …
Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics
In a recently released whitepaper, Trend Micro researchers have shared many details about a long-standing economic and political cyber-espionage operation they dubbed Pawn …
Beware of Ebola-themed phishing, malware campaigns and hoaxes
US-CERT released an advisory warning users about email scams and cyber campaigns using the Ebola virus disease as a theme. “Phishing emails may contain links that direct …
Featured news
Resources
Don't miss
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption
- NetBird: Open-source network security
- Burnout in cybersecurity: How CISOs can protect their teams (and themselves)