Please turn on your JavaScript for this page to function normally.
Evolving cyber threats continue to drive security strategy

43 percent of global companies think they have an effective information security strategy in place and are proactively executing their plans, placing them in the category of …

When scammers socialize

A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …

Facebook tool automates syphoning of user data

A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …

Researchers steal 20GB of corporate emails via doppelganger domains

Typosquatting is a well-known phenomena on the Internet. Most users have – at one point or another – misspelled the URL of the site they wanted to visit and were …

Human Compromise: The Art of Social Engineering

This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …

Big corporations “hacked” in Defcon social engineering contest

Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …

Chameleon-like fake AV delivered via clever social engineering

A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …

U.S. military contractors targeted with malicious PDFs

The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …

Google+ related scams move to Facebook

Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …

Security threats: Unwrapping 2011

2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …

First social engineering protection appliance

Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …

Romanian president declared dead by e-mail scam

BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …

Don't miss

Cybersecurity news