social engineering
Survey scammers impersonate Apple via SMS
As the number of smartphone users increases with each passing day, survey scammers have turned some of their attention to targeting users directly via SMS messages containing …
Users worry about data security, but still trust social networks
Although the majority of people (71 percent) are worried about the amount of personal information held online, a significant proportion would still share confidential …
Cybercriminals target Google, LinkedIn and Mass Effect 3 users
During March 2012, GFI Labs documented several spam attacks and malware-laden email campaigns infiltrating users’ systems under the guise of communications purporting to …
Ghost in the Wires
Kevin Mitnick accessed computers and networks at the world’s biggest companies – and however fast the authorities were, Mitnick was faster, sprinting through phone …
A new security strategy for Sony
2011 was a tough year for Sony. Having been attacked over 20 times by hacktivists going after its websites, the PlayStation Network, its customers’ and company …
$2.1 million stolen with clever social engineering
An unnamed fraudster managed to steal $2.1 million from a hospital chain’s Wells Fargo Bank escrow account by faxing a money transfer signed with a copied-and-pasted …
TicketWeb customers subjected to phishing after hack
Customers of TicketWeb UK, the popular British website selling event tickets, are being warned not to fall for fake emails purporting to come from the service, asking them to …
Nitro attackers still at it, mock Symantec
Back at the beginning of November, Symantec researchers made public a report they compiled on a spear phishing campaign carrying a backdoor Trojan that was systematically …
Mass manipulation through automated social engineering
In the past few years, social engineering has become cyber attackers’ preferred method for gaining access to target systems, and it usually takes the form of a spoofed …
Security threats to expand in 2012
Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …
Hybrid social engineering attacks
Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …
SpyEye Trojan hijacks mobile SMS security for online fraud
A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …
Featured news
Resources
Don't miss
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity