Please turn on your JavaScript for this page to function normally.
When scammers socialize

A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …

Facebook tool automates syphoning of user data

A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …

Researchers steal 20GB of corporate emails via doppelganger domains

Typosquatting is a well-known phenomena on the Internet. Most users have – at one point or another – misspelled the URL of the site they wanted to visit and were …

Human Compromise: The Art of Social Engineering

This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …

Big corporations “hacked” in Defcon social engineering contest

Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …

Chameleon-like fake AV delivered via clever social engineering

A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …

U.S. military contractors targeted with malicious PDFs

The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …

Google+ related scams move to Facebook

Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …

Security threats: Unwrapping 2011

2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …

First social engineering protection appliance

Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …

Romanian president declared dead by e-mail scam

BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …

Cybercrime statistics show widespread phishing problem

The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …

Don't miss

Cybersecurity news