Please turn on your JavaScript for this page to function normally.
Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

Cybergangs embracing crimeware over social engineering

The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …

Wombat unveils social engineering security training module

Wombat released its social engineering training module to defend against social engineering threats, including spear phishing and social media-based attacks. Commonly defined …

Ransomware demands survey completion instead of cash

Ransomware has replaced fake AV as the most high-profile and annoying malware targeting computer users around the world, and the approach is always the same: the owners of the …

Looking to the future: Security predictions for 2013

The door is closing on 2012, and it’s time to look ahead to next year. As you round out your 2013 business and IT plans, cybercriminals are resolving to implement …

Israel Police pulled computers offline due to RAT infestation

Trend Micro researchers have managed to get their hands on the malware that caused the Israeli Police Department to pull all of its systems offline last Thursday, and the …

Trojan disguised as image delivered via Skype messages

Skype users, beware of messages like this one: The spamming campaign has surfaced in the last few days and is being propagated via compromised Skype accounts. The offered …

FTC cracks down on international tech support scams

The Federal Trade Commission has launched a major international crackdown on tech support scams in which telemarketers masquerade as major computer companies, con consumers …

White House Military Office breached by Chinese hackers

Following the recent confirmation by a senior intelligence officer with the U.S. Cyber Command that the Pentagon systems and networks are constantly under cyber attacks and …

Twitter messages lead to phishing AND malware

If you have received a private message from another Twitter telling you “lol ur famous now”, have followed it to a fake Facebook page requiring you to log into …

(IN)SECURE Magazine issue 35 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 35 has been released today. Table of contents: …

Online daters targeted by blackmailing scammers

There are all kinds of online scammers. Most of them try to trick users into parting with their hard-earned money on their own accord, but there are also those that prefer a …

Don't miss

Cybersecurity news