2012 Doomsday Scam Continues to Serve up Doom, Giftcards
Chris Boyd over at GFI wrote: "If we survive the Mayan Apocalypse of 2012, does that mean were technically immortals? Ive no idea, but it will probably mean we dont see quite as many ...
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
Chris Boyd over at GFI wrote: "If we survive the Mayan Apocalypse of 2012, does that mean were technically immortals? Ive no idea, but it will probably mean we dont see quite as many ...
Mike Chapple is an IT professional and assistant professor of computer applications at the University of Notre Dame. He wrote at biztechmagazine:"Are your users aware of their ...
Kevin Mitnick sent this phish over. It's a classic attempt to get you to avaid a problem, but the moment you click this link, life will become a lot more painful. So... Stop. Look. Think ...
This week, the new APWG Global Phishing Report is being today at the Anti-Phishing Working Group meeting in Prague. This report is published every six months, detailing how phishers are ...
The upcoming London Olympics is undoubtedly one of the most highly-anticipated sports event of the year. It is also a favorite social engineering ploy among cybercriminals. Just recently, ...
An ordinary piece of spam slips through the filters, and you see a gorgeous sandy beach with palm trees. It's an enticing ad for a vacation to a tropical island, basically a big picture ...
Cybercriminals are as organized and industrious as any legitimate business. Case in point: exploit kits, also known as crimepacks, which bad guys can purchase and which make infecting ...
Researchers at NQ Mobile, working alongside researchers at North Carolina State University, have discovered new Android malware that is controlled via SMS that can do a number of things ...
[caption id="" align="alignleft" width="650" caption="Advanced Persistent Threat"][/caption]
Trendmicro reported: "We have recently analyzed a series of emails sent to specific users that leverage a certain prominent socio-political issue. One of these messages is about the ...
Anne Fisher, Editor of New York's Executive Inbox wrote: "Can you recognize a potentially disastrous breach of your computer systems security when you see it? Lets find out with two ...
Wow, instead of an exploit dropping a file onto the file system and running it... a DLL is injected straight into memory from the exploit, leaving nothing to scan on the harddrive. Writen ...
The Cridex malware trojan hides in fake LinkedIn invitations. Take care with those invites! GFI Labs recently discovered a LinkedIn email phishing scam that installs a banking trojan. It ...
Warn everyone that 'Tax Scam Season' is upon us, and that no one should respond to anything tax-related via email. The IRS does not use email or social media, don't fall for refund offers ...
We recommend you copy and paste this section, and send it to your executive team, with a warning that they might be targeted with spear-phishing attacks. They need to 'Stop, Look, Think' ...
[caption id="attachment_1378" align="alignleft" width="200" caption="Old Fashioned Robber"][/caption] Way back in your grand-pappys day (before cybercrime), a bank-robber or garden ...
[caption id="attachment_1372" align="alignleft" width="260" caption="Chinese Hackers"][/caption] A pair of notorious Chinese hackers who left the dark side are now urging other hackers in ...