Blog Posts Tagged with "Phishing"

7fef78c47060974e0b8392e305f0daf0

Social Engineering: The Tainted PDF and a Sales Call

January 12, 2012 Added by:Infosec Island Admin

Generally, people just aren’t thinking all that much when they get these calls. Sure, people should never be asking them for their passwords, but now this. Open this file would you? Tell me how many pages it has to verify that you got it, would you?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Phishing Campaign Using Spoofed US-CERT Emails

January 11, 2012 Added by:Headlines

US-CERT has received reports of a phishing email campaign that uses spoofed US-CERT email addresses. This campaign appears to be targeting a large number of private sector organizations as well as federal, state, and local governments...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Post-Breach STRATFOR Mailings: Fake vs Real?

January 07, 2012 Added by:Matthijs R. Koot

Infosec-savvy STRATFOR subscribers will look for clues to distinguish a fake email. Why would STRATFOR act in a manner that obfuscates four clues? STRATFOR knew about the breach since at least Dec 24/25, so I assume there has been time to advise on coping with fake mailings...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Facebook Attacks Feed Affiliate Marketing Scams

January 04, 2012 Added by:Headlines

"After users first click on the scams, malware or malicious scripts are to blame for the further spread of slightly over half the analyzed scams, with those falling into three main categories: likejacking, rogue applications, and malware or self-XSS..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Cyber Espionage Targeting Drone Technology

January 04, 2012 Added by:Headlines

"This campaign could target organizations related to technology used in... aerospace and military industries... With the information we collected it appears that this campaign has been running for months. Someone has said that cyberwar does not exist?. Draw your own conclusions..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Financial Sector Remains Vulnerable to Cyber Attacks

January 03, 2012 Added by:Headlines

"Within government, responsibility is fragmented. In America, the Treasury, other financial regulators, the Department of Homeland Security, the Pentagon, the FBI, the National Security Agency and others all have a hand in financial cybersecurity..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Feast of the Seven Phishes 2011

December 30, 2011 Added by:Robert Siciliano

One of my holiday traditions is to expose the year’s phishing scams. The following examples come straight from my inbox or spam filter, and have been abbreviated to demonstrate the nature of the scam and specific hook being used...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Restaurant Depot Customers Alerted of Data Breach

December 12, 2011 Added by:Headlines

"Trustwave found that that the thieves inserted malicious software or 'malware' into the credit and debit card processing systems used in Restaurant Depot stores. The malware collected card information as it was processed, stored it temporarily, and then sent it to a computer server in Russia..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CERT Warns of Holiday Phishing and Malware Campaigns

December 06, 2011 Added by:Headlines

"US-CERT encourages users and administrators to use caution when encountering email messages and take the following preventative measures to protect themselves from phishing scams and malware campaigns..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Password Cracking Methods

December 05, 2011 Added by:Headlines

"A rainbow table is a list of pre-computed hashes - the numerical value of an encrypted password, used by most systems today - and that’s the hashes of all possible password combinations for any given hashing algorithm mind..."

Comments  (2)

37d5f81e2277051bc17116221040d51c

Holiday Headaches Coming for Consumers

December 01, 2011 Added by:Robert Siciliano

When handing your card to a clerk or cashier, pay close attention. The card should be swiped through a point of sale terminal or keyboard card reader once, maybe twice. If your card is swiped through an additional reader, the card number may have been stolen...

Comments  (0)

37d5f81e2277051bc17116221040d51c

McAfee: The Twelve Scams of Christmas

November 28, 2011 Added by:Robert Siciliano

Whether you like it or not, the Christmas machine arrived well before Thanksgiving — at least as far as stores and advertisers are concerned. And there’s no question that scammers, identity thieves, and criminal hackers have already begun setting traps for holiday shoppers...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Ten Tips to Stay Safe on Cyber Monday

November 16, 2011 Added by:Allan Pratt, MBA

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. Here are some tips to stay safe on the largest online activity day of the year...

Comments  (0)

A6f413a75686867ef5010ac90b5ceef9

A Perspective on Advanced Persistent Threat

October 25, 2011 Added by:Chris Kimmel

A true APT has close to a 100% penetration rate. It should be noted that the difficulty of attacks can range from simple social engineering to a zero-day. These attackers will tend to use any attack method they can to penetrate an organization...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Think You’re Protected? Think Again...

October 18, 2011 Added by:Robert Siciliano

Now as companies leverage the power of the web, information security has evolved yet again: We are in the application security era. And as big companies get better at locking down their software and protecting their data, criminals are targeting the little guy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Powers Wary of Chinese Cyber Espionage Ops

September 26, 2011 Added by:Headlines

"The broad international view... is that China is one of the countries at the forefront of cyber attacks on other states, which it is doing for fairly obvious reasons - intelligence gathering, political and strategic advantage, and also for defensive purposes..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »