Please turn on your JavaScript for this page to function normally.
Expanding phishing vector: Classified ads

The online classified advertisement services sector has been increasingly exploited as a phishing attack vector by ecrime gangs, a trend confirmed by the growth of attacks …

An increase in form-based e-mail phishing attacks

Luring people in with the promise of hefty tax refunds and “stimulus payments”, phishers have been targeting users with e-mails purportedly coming from HM Revenue …

PayPal most phished, Facebook most blocked

OpenDNS released statistics about which websites were commonly blocked — and which websites users were frequently given access to — in 2010. The report additionally details …

Dramatic increase in malware and phishing via social networks

By mid-2010, Facebook recorded half a billion active users, making it not only the largest social networking site, but also one of the most popular destinations on the web. …

Tuesday is the most active day for threats

The most active day for threat-related traffic worldwide is Tuesday, with Monday a close second, according to a report by SonicWALL. This pattern holds true for the U.S., …

Week in review: Phishing, Kneber botnet and Microsoft vulnerabilities

Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Adobe PDF format riddled with exploitable features Adobe’s PDF …

Mobile users more vulnerable to phishing attacks

Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users …

Security, is there an app for that?

Smartphones are now an essential tool across all sections of society, from top government officials to businesses and consumers. If you are one of the hundreds of millions of …

Avoid the phishing net

Phishing, the process of attempting to acquire sensitive information by masquerading as a legitimate and trustworthy company via online means, used to just be a problem for …

The golden hour of phishing attacks

Trusteer conducted research into the attack potency and time-to-infection of email phishing attacks. One of their findings was that 50 per cent of phishing victims’ …

Phishers exploit Facebook features

Phishing e-mails supposedly coming from the Facebook Security Team with account deactivation warnings have been hitting inboxes around the world. The targeted users are led to …

Amazon profiles abused by spammers and malware pushers

Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …

Don't miss

Cybersecurity news