Tech Support Scam Freezes Browsers

Trend Micro has found a new tech support scam that abuses HTML’s Inline Frame element (iframe) along with authentication pop-ups to freeze victims’ browsers by trapping them in a type of ...
Continue Reading

U.S. Universities are the Target of Chinese Hackers Seeking Undersea Military Secrets

Schools like MIT and the University of Hawaii are the focus of Chinese hackers looking for research hubs or field experts at universities tied to Navy programs.
Continue Reading

Global spending on security hardware, software and services will top $103 billion in 2019, up 9.4 percent from 2018

Global spending on security hardware, software and services will top $103 billion in 2019, up 9.4 percent from 2018, with large enterprises spending the most, according to IDC data.
Continue Reading

Big Norwegian Aluminum Producer Norsk Hydro Suffers Major Ransomware Attack

Norsk Hydro ASA, one of the world’s biggest aluminum producers, suffered production outages after a ransomware attack affected operations across Europe and the U.S.
Continue Reading

60% of Organizations Have No CSO or CISO, Putting Network Security at Risk

Recent data from Check Point Security’s Cyber Talk shows organizations are massively unprepared for attacks on network, mobile, and physical security.
Continue Reading

New Evil USB Cable Shows How Attacks Can Leverage Physical Hardware

The latest security research project has led to a USB cable so malicious that it can be used for just about any kind of attack.
Continue Reading

[On-Demand Webinar] The Quantum Computing Break Is Coming... Will You Be Ready?

  Quantum computing is a game-changer and will have a huge impact on the way we do business, safeguard data, explore space, and even predict weather events. Yet, some experts say in the ...
Continue Reading

Sixth Circuit Says Policyholder's Social Engineering Loss Covered By Computer Fraud Policy

Note: We blogged about a very similar 2nd  Circuit case earlier this year in CyberheistNews, the first paragraph below refers to that case.
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews