Please turn on your JavaScript for this page to function normally.
Survey scammers impersonate Apple via SMS

As the number of smartphone users increases with each passing day, survey scammers have turned some of their attention to targeting users directly via SMS messages containing …

Users worry about data security, but still trust social networks

Although the majority of people (71 percent) are worried about the amount of personal information held online, a significant proportion would still share confidential …

Cybercriminals target Google, LinkedIn and Mass Effect 3 users

During March 2012, GFI Labs documented several spam attacks and malware-laden email campaigns infiltrating users’ systems under the guise of communications purporting to …

Ghost in the Wires

Kevin Mitnick accessed computers and networks at the world’s biggest companies – and however fast the authorities were, Mitnick was faster, sprinting through phone …

A new security strategy for Sony

2011 was a tough year for Sony. Having been attacked over 20 times by hacktivists going after its websites, the PlayStation Network, its customers’ and company …

$2.1 million stolen with clever social engineering

An unnamed fraudster managed to steal $2.1 million from a hospital chain’s Wells Fargo Bank escrow account by faxing a money transfer signed with a copied-and-pasted …

TicketWeb customers subjected to phishing after hack

Customers of TicketWeb UK, the popular British website selling event tickets, are being warned not to fall for fake emails purporting to come from the service, asking them to …

Nitro attackers still at it, mock Symantec

Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically …

Mass manipulation through automated social engineering

In the past few years, social engineering has become cyber attackers’ preferred method for gaining access to target systems, and it usually takes the form of a spoofed …

Security threats to expand in 2012

Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …

Hybrid social engineering attacks

Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …

SpyEye Trojan hijacks mobile SMS security for online fraud

A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …

Don't miss

Cybersecurity news