Blog Posts Tagged with "Phishing"
August 17, 2011 Added by:Rafal Los
I know many of my colleagues in infosec sympathize with the Anonymous cause, because it's not too difficult to do so. While I won't comment on how I feel about that - I can tell you I absolutely do not condone the reckless actions and short-sighted activity that leads to more harm than good...
July 10, 2011 Added by:Robert Siciliano
McAfee’s most unwanted criminals include pickpockets, Trojans, and ATM skimmers, dumpster divers, spies, and wireless hackers and now phishers, shoulder surfers, and keyloggers. The key is awareness, vigilance, and investing in products and services that are designed to protect you...
June 30, 2011 Added by:Christopher Burgess
Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity. Recently, one slipped through my filters. I've taken the liberty to identify each item within this phish, which seems fishy...
June 29, 2011 Added by:Headlines
Operation Phish Phry revealed how Egyptian hackers obtained account numbers and personal identification information from bank customers through phishing — a technique that involves sending e-mail messages that appear to be official correspondence from banks or credit card vendors...
May 24, 2011 Added by:Headlines
Small and medium-sized organizations have become the primary targets of the Eastern European hacker gangs behind this frightening new crime wave. These cybercriminals tend to prey on smaller businesses and banks that lack the cyber-fraud controls many larger institutions have in place...
April 26, 2011 Added by:Headlines
As the financial year draws to a close in many countries, it is possible that the timing is perfect for cybercriminals seeking information about the financial performance of a company, and a carefully crafted attack may be the means by which they can achieve this...
April 19, 2011 Added by:Robert Siciliano
Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...
April 19, 2011 Added by:Headlines
"Certainly what we’ve seen is very consistent with the RSA attack. Whoever is doing this attempts to get a foothold in the network system, works patiently and relatively quietly to try to expand that and is looking for specific types of information..."
April 18, 2011 Added by:Rod MacPherson
Another scam that they are running is a fake Epsilon breach news update site (copied from the actual press release site) that offers up a downloadable tool that they tell you to run to see if the hackers have your e-mail address. That tool is a Trojan...
April 15, 2011 Added by:Robert Siciliano
Twitter’s numbers are astounding. In the physical world, when communities become larger and more densely populated, crime rises. The same applies to online communities. Spammers, scammers, and thieves are paying attention...
April 11, 2011 Added by:Alexander Rothacker
Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...
April 06, 2011 Added by:Headlines
“What's most frightening is the fact that this isn't just an unknowing private citizen being duped by a phony Facebook friend. This is a multibillion dollar corporation that clearly did not do its homework," said Paul Henry, a forensics and security analyst at Lumension...
March 21, 2011 Added by:Robert Siciliano
When a natural disaster hits, most people get an urge to help those in distress. Our want/need/ability to help out comes from thousands of years of communal living as an interdependent species. However, natural disasters also bring out the worst bottom feeding sleazebags who smell blood...
March 16, 2011 Added by:Robert Siciliano
Phishing continues to become more sophisticated, more effective, and more prevalent. In one example, criminal hackers waited until Pennsylvania school administrators were on vacation, then used simple money transfers to liquidate over $440,000 out of the districts accounts...
March 15, 2011 Added by:Robert Siciliano
Cybercrime is one of the most lucrative industries, growing by double digits year after year. Over the last decade, cyber crooks have developed sophisticated ways to prey on an explosion of Internet users with little danger of being caught. A few famous exploits illustrate different eras of cybercrime...
February 08, 2011 Added by:Headlines
The researchers produced a tool that uses statistical analysis to calculate the relative uniqueness of any given username. The team can now distinguish a single user about half of the time by analyzing multiple usernames without using other key data such as location or date of birth...
Hacker to Release Symantec's PCAnywhere Sour... Kajal Singh on 04-21-2015
Financial Malware Fell in 2014 As Takedown O... Kajal Singh on 04-21-2015
Weaknesses in Air Traffic Control Systems ar... Kajal Singh on 04-21-2015