social engineering
Social engineering: Clear and present danger
Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …
Cybergangs embracing crimeware over social engineering
The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …
Wombat unveils social engineering security training module
Wombat released its social engineering training module to defend against social engineering threats, including spear phishing and social media-based attacks. Commonly defined …
Ransomware demands survey completion instead of cash
Ransomware has replaced fake AV as the most high-profile and annoying malware targeting computer users around the world, and the approach is always the same: the owners of the …
Looking to the future: Security predictions for 2013
The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …
Israel Police pulled computers offline due to RAT infestation
Trend Micro researchers have managed to get their hands on the malware that caused the Israeli Police Department to pull all of its systems offline last Thursday, and the …
Trojan disguised as image delivered via Skype messages
Skype users, beware of messages like this one: The spamming campaign has surfaced in the last few days and is being propagated via compromised Skype accounts. The offered …
FTC cracks down on international tech support scams
The Federal Trade Commission has launched a major international crackdown on tech support scams in which telemarketers masquerade as major computer companies, con consumers …
White House Military Office breached by Chinese hackers
Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …
Twitter messages lead to phishing AND malware
If you have received a private message from another Twitter telling you “lol ur famous now”, have followed it to a fake Facebook page requiring you to log into …
(IN)SECURE Magazine issue 35 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 35 has been released today. Table of contents: …
Online daters targeted by blackmailing scammers
There are all kinds of online scammers. Most of them try to trick users into parting with their hard-earned money on their own accord, but there are also those that prefer a …