phishing
Week in review: Phishing, Kneber botnet and Microsoft vulnerabilities
Here’s an overview of some of last week’s most interesting news, videos, reviews and articles: Adobe PDF format riddled with exploitable features Adobe’s PDF …
Mobile users more vulnerable to phishing attacks
Trusteer recently gained access to the log files of several web servers that were hosting phishing websites. Analyzing these log files provided visibility into how many users …
Security, is there an app for that?
Smartphones are now an essential tool across all sections of society, from top government officials to businesses and consumers. If you are one of the hundreds of millions of …
Avoid the phishing net
Phishing, the process of attempting to acquire sensitive information by masquerading as a legitimate and trustworthy company via online means, used to just be a problem for …
The golden hour of phishing attacks
Trusteer conducted research into the attack potency and time-to-infection of email phishing attacks. One of their findings was that 50 per cent of phishing victims’ …
Phishers exploit Facebook features
Phishing e-mails supposedly coming from the Facebook Security Team with account deactivation warnings have been hitting inboxes around the world. The targeted users are led to …
Amazon profiles abused by spammers and malware pushers
Experience has proven that if a site enables users to contribute content, this feature will be abused by those who want to push their own agenda – usually spammers. This …
E-commerce and online gaming phishing attacks surge
Phishing attacks through impersonation of e-commerce sites and gaming companies increased significantly year-over-year around the world in the third quarter of 2010, according …
Well crafted PayPal phishing e-mail doing rounds
A well crafted e-mail purportedly coming from the “PayPal Review Department” has been hitting inboxes lately. In it, potential victims are notified that due to …
Orkut users under phishing attack
Orkut users have lately been targeted with a clever scheme that redirects them to phishing pages without them having to do anything except visit a compromised account. Using …
Real time phishing attacks increase
30% of attacks against websites that use two-factor authentication are now utilizing real-time man-in-the-middle techniques to bypass this trusted security mechanism, …
Fake USAA e-mails phishing for card information
E-mails purportedly sent by the United States Automobile Association (USAA) have been hitting inboxes in the last few days, M86 researchers warn. In it, the recipients are …