Phishing

E595c1d49bf4a26f8e14ce59812af80e

Battlefield Mobile: Threats Targeting In-Motion Endpoints Climbed in 2014

January 22, 2015 Added by:Patrick Oliver Graf

Brute force attacks, phishing schemes, SQL injections – they’re all proven attack methods that network administrators prepare for and defend against. But what about the next frontier? What attack vectors and endpoints do hackers now think are most vulnerable?

Comments  (1)

C940e50f90b9e73f42045c05d49c6e17

New Adobe Flash Zero-Day found in the Wild

January 22, 2015 Added by:Malwarebytes

Security researcher Kafeine has discovered a Zero-Day in Adobe Flash Player distributed through the Angler Exploit Kit.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Cyber-Civic Responsibility

January 21, 2015 Added by:Brent Huston

The only thing that really has a chance of working is if we all start taking responsibility for our own share of the problem.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Buying Illegal Goods on the Digital Underground

January 19, 2015 Added by:Tripwire Inc

The fact that Silk Road has returned is a testament to users’ ongoing ability to purchase illegal goods online, not to mention merchants’ ability to sell these products.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Social Engineering: How Dangerous is Your Lunch Break?

January 15, 2015 Added by:Tripwire Inc

If an attacker (or anyone else) wants to know what’s going on in an organization, all they need to do is go to lunch.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

How to Avoid Getting Phished

January 14, 2015 Added by:Brent Huston

It’s much easier for an attacker to “hack a human” than “hack a machine”. This is why complicated attacks against organizations often begin with the end user.

Comments  (0)

65be44ae7088566069cc3bef454174a7

How to Protect Against Virulent Ransomware

January 07, 2015 Added by:Rebecca Herold

In early December, there were several reports about yet another type of ransomware, VirRansom, the next evolution of ransomware. It combines the ransomware feature of making data unavailable and locking up your computer until you pay the crooks a ransom with the feature of a virus, which allows it to spread to others.

Comments  (2)

Bbd4f9420cc0edec55cb25411422efd2

Top 10 Phishing Attacks of 2014

December 16, 2014 Added by:Ronnie Tokazowski

While attackers are loading up their phishing emails with new malware all the time, the majority of their phishing emails use stale, recycled content.

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

Avoiding the Bait: Helpful Tips to Protect Yourself Against Phishing Scams

November 24, 2014 Added by:Tripwire Inc

Phishing scams come in all shapes and sizes. But one thing is for certain: they are all around us.

Comments  (1)

Default-avatar

iWorm The First OSX Bot To Use Reddit For CnC: Expect Mac malware to surge

October 07, 2014 Added by:Cyphort

Nowadays, as half of newly issued computers in the enterprise are Macs, OSX malware is also becoming more prevalent.

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Computer Security is Your Own Responsibility

September 24, 2014 Added by:Brent Huston

The biggest part of computer security is just mundane, common sense stuff.

Comments  (0)

93c815429fc1ab15a9295a4f55989ae0

A Tale of Two Professionals

September 09, 2014 Added by:Neohapsis

Due to the disclosure of their phone numbers coupled with the power of Google and other search engines, the potential for extortion by a random individual who is now in possession of compromising photos is also a reality.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Are Connected Cars on a Collision Course with Network Security?

August 26, 2014 Added by:Patrick Oliver Graf

Flipping through any consumer publication that rates vehicles, you’ll see all the metrics you would expect – from safety and performance (acceleration, braking, etc.) to comfort, convenience and fuel economy. What you won’t find is an assessment of the car’s risk of being remotely hacked.

Comments  (0)

C940e50f90b9e73f42045c05d49c6e17

Facebook “Enter Details Here to Enable Your Account”

July 30, 2014 Added by:Malwarebytes

Here’s one in-the-wild phishing campaign that we spotted homing in on users.

Comments  (0)

F5b1211c3952ce30f829cd3c757a1a7f

Cyphort Detects Surge in Ad Network Infections, a.k.a. “Malvertising”

July 24, 2014 Added by:Ali Golshan

We recently noticed a surge where exploit packs are served from DMO (Destination Marketing Organization) websites using an Ad network called simpleviewinc.com during the July 4th long weekend.

Comments  (2)

E313765e3bec84b2852c1c758f7244b6

Crypto Locker Down, But NOT Out

July 23, 2014 Added by:Brent Huston

Even as the govt was touting their takedown, threat intelligence companies around the world (including MSI), were already noticing that the attackers were mutating, adapting and re-building a new platform to continue their attacks.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked