Blog Posts Tagged with "scams"

9f19bdb2d175ba86949c352b0cb85572

Five Steps to a Successful Social Attack

April 29, 2012 Added by:Neira Jones

You might not fall for these attacks, but how many members of your family would? How many employees in your organization would, from field staff to C-level execs? Different people will have different thresholds to these attacks. Security education and awareness is key...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

The FBI Discusses Internet Social Networking Risks

April 05, 2012 Added by:Infosec Island Admin

Social networking sites have created a revolution in connectivity. However, con artists, criminals, and other actors are exploiting this capability for nefarious purposes. There are primarily two tactics used to exploit social networks. In practice, they are often combined...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Protect Yourself from Vishing Scams

March 30, 2012 Added by:Robert Siciliano

Vishing occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft...

Comments  (0)

09dae715e355968a0e90ebddf038ad56

How to Hack Into the Music Industry

March 29, 2012 Added by:Quintius Walker

When it comes to the vulnerabilities presented by the online aspects of the music industry, the opportunities for penetration tester’s to employ their skills are far and wide. However, they are still for the most part often overlooked. And with great peril...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

It's not Illegal if You Consent: Malware's Dirty Little Tricks

March 08, 2012 Added by:Rafal Los

Bad guys often rely on the end-user's lack of awareness, employing some dirty tricks like creating a convincing web page that looks just like your antivirus software, or something equally dastardly. But there's another trick that makes me crazy: End User License Agreements...

Comments  (0)

29fb4966bdfcfff5545ae464c771071b

Social Media, Over-Sharing and Personal Data Controls

March 04, 2012 Added by:Gurudatt Shenoy

The solution lies in having control of your data. This means your data is encrypted and stored on social network servers and only you have the the keys to provide access to others. Social Networks should also offer tools that enable clear and identifiable verification of members...

Comments  (2)

82ac4cd789b46af43c0cde730625317e

How to Protect Yourself from Skimmers

February 28, 2012 Added by:Christopher Rodgers

When you swipe your credit or debit card, are you handing over your personal information to criminals? Skimming is a process scammers use to steal credit or debit card information. Scammers use devices called skimmers to accomplish skimming in everyday transactions...

Comments  (0)

8ab4e596af60cabbf46c7ecf016af0ad

Is LinkedIn Really Secure?

February 24, 2012 Added by:Brittany Lyons

LinkedIn has faced scams and viral attacks, and users have watched private information become public without their permission. Online vulnerability is a problem, and though LinkedIn has addressed issues in a punctual manner, this does not prevent new problems from arising...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Tax Season Phishing Scams and Malware Campaigns

February 09, 2012 Added by:Headlines

Due to the upcoming tax deadline, US-CERT reminds users to remain cautious when receiving unsolicited email that could be part of a potential phishing scam or malware campaign. These messages may appear to be from the IRS and ask users to submit personal information...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

New Drive-By Malware Spam Infects Upon Opening Email

February 01, 2012 Added by:Pierluigi Paganini

According the announcement from researchers at Eleven, a German security firm, it is sufficient that a communication is merely opened in the email client to infect the target without the user clicking on a link or opening an attachment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DMARC Email Authentication Work Group Launched

January 31, 2012 Added by:Headlines

The group's work includes a draft specification that helps create a feedback loop between legitimate email senders and receivers to make impersonation more difficult for phishers trying to send fraudulent email...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Beware the TypoSquatters

January 24, 2012 Added by:Theresa Payton

Cybercriminals go where the action is - they wait for websites to get popular and then register domain names based on popular mis-spellings. Once the typosquatter lures you to their site, they use all types of tricks to get you to give them your personal information...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Facebook Attacks Feed Affiliate Marketing Scams

January 04, 2012 Added by:Headlines

"After users first click on the scams, malware or malicious scripts are to blame for the further spread of slightly over half the analyzed scams, with those falling into three main categories: likejacking, rogue applications, and malware or self-XSS..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Feast of the Seven Phishes 2011

December 30, 2011 Added by:Robert Siciliano

One of my holiday traditions is to expose the year’s phishing scams. The following examples come straight from my inbox or spam filter, and have been abbreviated to demonstrate the nature of the scam and specific hook being used...

Comments  (0)

37d5f81e2277051bc17116221040d51c

A Sherriff Issues Holiday Crime Prevention Tips

December 27, 2011 Added by:Robert Siciliano

We are coming up on one of the most festive times of the year for families with the celebration of several holidays. However, joy and fun can quickly turn to disappointment and sorrow when someone becomes a victim of a scam, burglary or online fraudulent holiday shopping scheme

Comments  (0)

69dafe8b58066478aea48f3d0f384820

CERT Warns of Holiday Phishing and Malware Campaigns

December 06, 2011 Added by:Headlines

"US-CERT encourages users and administrators to use caution when encountering email messages and take the following preventative measures to protect themselves from phishing scams and malware campaigns..."

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »