social engineering
Ransomware uses browser history to persuade users to pay up
A new ransomware variant dubbed Kovter has been spotted trying out a brand new approach for convincing targeted users of the legitimacy of its claims. According a malware …
Cloud-based tool simulates social engineering
TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …
Xbox Live accounts hack performed by attackers that hit Krebs and Honan?
Microsoft has confirmed that a number of Xbox Live accounts of their current and former employees have been compromised by attackers using “several stringed social …
(IN)SECURE Magazine issue 37 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 37 has been released today. Table of contents: …
Yahoo Mail accounts still hijacked daily
Email account hijacking has been a big problem for Yahoo Mail users since the beginning of the year, as a number of vulnerabilities have been discovered, shared online and …
Warning from “Mark Zurckerberg” leads to account hijacking
If you get an email sent by “Mark Zurckerberg”, saying your Facebook account might be permanently suspended because of violations of the social network’s …
Real world social engineering challenge at HITBSECCONF2013
Global IT services provider Sogeti will launch their social engineering challenge during the Hack In The Box Amsterdam conference in April. The challenge will be to social …
Uyghur Mac users targeted with spear-phishing emails
Uyghur activists are, once again, targeted with spear-phishing emails whose goal is to set up a backdoor on the victims’ computers. The Uyghurs are a Turkic ethnic …
Comment Group hackers specialize in high-profile targeted attacks
It is common knowledge that spear-phishing has become the preferred way for persistent attackers to gain a foothold in targeted systems and network. In fact, most of the …
Social engineering: Clear and present danger
Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …
Cybergangs embracing crimeware over social engineering
The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …
Wombat unveils social engineering security training module
Wombat released its social engineering training module to defend against social engineering threats, including spear phishing and social media-based attacks. Commonly defined …
Featured news
Resources
Don't miss
- Balancing data protection and clinical usability in healthcare
- BlueToolkit: Open-source Bluetooth Classic vulnerability testing framework
- Your smart home may not be as secure as you think
- Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
- Building a reasonable cyber defense program