Blog Posts Tagged with "Phishing"

5e402abc3fedaf8927900f014ccc031f

Ten Tips to Stay Safe on Cyber Monday

November 16, 2011 Added by:Allan Pratt, MBA

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. Here are some tips to stay safe on the largest online activity day of the year...

Comments  (0)

A6f413a75686867ef5010ac90b5ceef9

A Perspective on Advanced Persistent Threat

October 25, 2011 Added by:Chris Kimmel

A true APT has close to a 100% penetration rate. It should be noted that the difficulty of attacks can range from simple social engineering to a zero-day. These attackers will tend to use any attack method they can to penetrate an organization...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Think You’re Protected? Think Again...

October 18, 2011 Added by:Robert Siciliano

Now as companies leverage the power of the web, information security has evolved yet again: We are in the application security era. And as big companies get better at locking down their software and protecting their data, criminals are targeting the little guy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Powers Wary of Chinese Cyber Espionage Ops

September 26, 2011 Added by:Headlines

"The broad international view... is that China is one of the countries at the forefront of cyber attacks on other states, which it is doing for fairly obvious reasons - intelligence gathering, political and strategic advantage, and also for defensive purposes..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Real Consequences of an Anonymous Data Leak

August 17, 2011 Added by:Rafal Los

I know many of my colleagues in infosec sympathize with the Anonymous cause, because it's not too difficult to do so. While I won't comment on how I feel about that - I can tell you I absolutely do not condone the reckless actions and short-sighted activity that leads to more harm than good...

Comments  (2)

37d5f81e2277051bc17116221040d51c

Phishers, Shoulder Surfers and Keyloggers

July 10, 2011 Added by:Robert Siciliano

McAfee’s most unwanted criminals include pickpockets, Trojans, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. The key is awareness, vigilance, and investing in products and services that are designed to protect you...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

When a "Phish" is Really Fishy

June 30, 2011 Added by:Christopher Burgess

Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity. Recently, one slipped through my filters. I've taken the liberty to identify each item within this phish, which seems fishy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Phishing Ring Leader Sentenced to Thirteen Years

June 29, 2011 Added by:Headlines

Operation Phish Phry revealed how Egyptian hackers obtained account numbers and personal identification information from bank customers through phishing — a technique that involves sending e-mail messages that appear to be official correspondence from banks or credit card vendors...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Research Reveals Widespread Vulnerability to Phishing

May 24, 2011 Added by:Headlines

Small and medium-sized organizations have become the primary targets of the Eastern European hacker gangs behind this frightening new crime wave. These cybercriminals tend to prey on smaller businesses and banks that lack the cyber-fraud controls many larger institutions have in place...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Releases MessageLabs April Intelligence Report

April 26, 2011 Added by:Headlines

As the financial year draws to a close in many countries, it is possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be the means by which they can achieve this...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Epsilon Breach Will Impact Consumers for Years

April 19, 2011 Added by:Robert Siciliano

Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Cyber Attack Hits Oak Ridge National Laboratory

April 19, 2011 Added by:Headlines

"Certainly what we’ve seen is very consistent with the RSA attack. Whoever is doing this attempts to get a foothold in the network system, works patiently and relatively quietly to try to expand that and is looking for specific types of information..."

Comments  (0)

314f19f082e69886c20e31c70fe6dceb

Epsilon: Be Wary of Phishing Attempts

April 18, 2011 Added by:Rod MacPherson

Another scam that they are running is a fake Epsilon breach news update site (copied from the actual press release site) that offers up a downloadable tool that they tell you to run to see if the hackers have your e-mail address. That tool is a Trojan...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Twitter Scam Hooks Thousands

April 15, 2011 Added by:Robert Siciliano

Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

What the Epsilon Data Breach Means To You

April 11, 2011 Added by:Alexander Rothacker

Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

How to Scam $8 Million Dollars in Three Easy Steps

April 06, 2011 Added by:Headlines

“What's most frightening is the fact that this isn't just an unknowing private citizen being duped by a phony Facebook friend. This is a multibillion dollar corporation that clearly did not do its homework," said Paul Henry, a forensics and security analyst at Lumension...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »