Scam Of The Week: See Robin Williams Last Words On Video
Last night, news broke that Robin Williams was found dead in his home in Marin County, CA. It is suspected that it was either a suicide or an overdose. This is a celebrity death that the ...
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
Last night, news broke that Robin Williams was found dead in his home in Marin County, CA. It is suspected that it was either a suicide or an overdose. This is a celebrity death that the ...
Dell has its own news site called Tech Page One. A few days ago they had a new article that started with: "Human errors that aid social engineers. The weakest links in computer networks ...
Almost 300 people get shot out of the air and the only thing cyber-criminals can think of is how to exploit the disaster. What else is new. Disgusting.
Unscrupulous eastern European cyber mafias are preying on U.S. workers that try to make ends meet and look for a second (or third) job. This is not a new scam, but it is sticking up its ...
We surveyed over 300 system administrators regarding ransomware, here are the results:
Ever hear of CoinDesk? They are a news site about pricing and other info about digital currencies. They reported a fascinating phishing attack on a list of auction participants.
Security experts have warned for years that our smartphones are due for a major cyberattack. Like PCs back in the early days -- the 1990s -- mobile phones are largely unprotected by ...
The United States continued to host the majority of phishing websites in the first quarter of 2014, but did not even crack the top 36 when it came to global computer infection rates, ...
The AppRiver team dsicovered an increase in phishing scams containing the Zortob Trojan. The new surge uses an existing successful scam, which warns the victim that they've been ordered ...
First week of July we will cut over to a new mailserver, which allows us to use different "hover-domains" (meaning a user sees something else than the domain we used as the default up to ...
This is from a few weeks ago, and I only just got to it. Hackers can exfiltrate data via a cellphone and no longer need the Internet to invade and control a system, Ben Gurion University ...
The bad guys use social engineering to make end-users click on links, and their scams rely mostly on exploiting trust. If they can make you believe a message is from a trusted source, ...
An Eastern European Cyber Mafia has been found to run a multi-year campaign that targets small U.S. banks and credit unions with a sophisticated VoIP phishing scheme (aka vishing) to ...
Danny Yadron at the WSJ got the picture right. State, and local law enforcement are struggling to keep up as their online case load grows. They are even gettting a hand from the FBI here ...
During the first quarter, I have been warning about the coming wave of Windows XP-related scams having to do with the April 8 End Of Life of XP. Here is what you can expect, and many ...
Love your tall latte? Better watch it, as a "friend" might send you an email with a fake Starbucks Coffee Gift offer. These emails read something like this in broken english. "Your friend ...
I had a look at the recent Mandiant M-Trends report. Interesting stuff. They observed that employees seem to fall for hacking tricks mostly on Wednesdays, and are most likely to click on ...
This week I attended a webinar about Security Awareness Training hosted by David Monahan, Research Director Security and Risk Management of Enterprise Management Associates.
Cyber security professionals are slowly but surely grabbing more and more military jargon. No surprises there, with a possible cyberwar brewing. The "kill chain" is a traditional warfare ...