Blog Posts Tagged with "Phishing"


McAfee: The Twelve Scams of Christmas

November 28, 2011 Added by:Robert Siciliano

Whether you like it or not, the Christmas machine arrived well before Thanksgiving — at least as far as stores and advertisers are concerned. And there’s no question that scammers, identity thieves, and criminal hackers have already begun setting traps for holiday shoppers...

Comments  (0)


Ten Tips to Stay Safe on Cyber Monday

November 16, 2011 Added by:Allan Pratt, MBA

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. Here are some tips to stay safe on the largest online activity day of the year...

Comments  (0)


A Perspective on Advanced Persistent Threat

October 25, 2011 Added by:Chris Kimmel

A true APT has close to a 100% penetration rate. It should be noted that the difficulty of attacks can range from simple social engineering to a zero-day. These attackers will tend to use any attack method they can to penetrate an organization...

Comments  (0)


Think You’re Protected? Think Again...

October 18, 2011 Added by:Robert Siciliano

Now as companies leverage the power of the web, information security has evolved yet again: We are in the application security era. And as big companies get better at locking down their software and protecting their data, criminals are targeting the little guy...

Comments  (0)


Western Powers Wary of Chinese Cyber Espionage Ops

September 26, 2011 Added by:Headlines

"The broad international view... is that China is one of the countries at the forefront of cyber attacks on other states, which it is doing for fairly obvious reasons - intelligence gathering, political and strategic advantage, and also for defensive purposes..."

Comments  (0)


The Real Consequences of an Anonymous Data Leak

August 17, 2011 Added by:Rafal Los

I know many of my colleagues in infosec sympathize with the Anonymous cause, because it's not too difficult to do so. While I won't comment on how I feel about that - I can tell you I absolutely do not condone the reckless actions and short-sighted activity that leads to more harm than good...

Comments  (2)


Phishers, Shoulder Surfers and Keyloggers

July 10, 2011 Added by:Robert Siciliano

McAfee’s most unwanted criminals include pickpockets, Trojans, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. The key is awareness, vigilance, and investing in products and services that are designed to protect you...

Comments  (0)


When a "Phish" is Really Fishy

June 30, 2011 Added by:Christopher Burgess

Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity. Recently, one slipped through my filters. I've taken the liberty to identify each item within this phish, which seems fishy...

Comments  (0)


Phishing Ring Leader Sentenced to Thirteen Years

June 29, 2011 Added by:Headlines

Operation Phish Phry revealed how Egyptian hackers obtained account numbers and personal identification information from bank customers through phishing — a technique that involves sending e-mail messages that appear to be official correspondence from banks or credit card vendors...

Comments  (0)


Research Reveals Widespread Vulnerability to Phishing

May 24, 2011 Added by:Headlines

Small and medium-sized organizations have become the primary targets of the Eastern European hacker gangs behind this frightening new crime wave. These cybercriminals tend to prey on smaller businesses and banks that lack the cyber-fraud controls many larger institutions have in place...

Comments  (0)


Symantec Releases MessageLabs April Intelligence Report

April 26, 2011 Added by:Headlines

As the financial year draws to a close in many countries, it is possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be the means by which they can achieve this...

Comments  (0)


Epsilon Breach Will Impact Consumers for Years

April 19, 2011 Added by:Robert Siciliano

Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...

Comments  (1)


Cyber Attack Hits Oak Ridge National Laboratory

April 19, 2011 Added by:Headlines

"Certainly what we’ve seen is very consistent with the RSA attack. Whoever is doing this attempts to get a foothold in the network system, works patiently and relatively quietly to try to expand that and is looking for specific types of information..."

Comments  (0)


Epsilon: Be Wary of Phishing Attempts

April 18, 2011 Added by:Rod MacPherson

Another scam that they are running is a fake Epsilon breach news update site (copied from the actual press release site) that offers up a downloadable tool that they tell you to run to see if the hackers have your e-mail address. That tool is a Trojan...

Comments  (0)


Twitter Scam Hooks Thousands

April 15, 2011 Added by:Robert Siciliano

Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...

Comments  (0)


What the Epsilon Data Breach Means To You

April 11, 2011 Added by:Alexander Rothacker

Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »