Spear phishing alert: Hong Kong Monetary Authority Invoice
Experts warn that cybercriminals are using fake Hong Kong Monetary Authority invoices to distribute a piece of malware. The emails are entitled “Invoice #3404196 – Remit File” and they ...
Learn about current spear phishing attacks, specific examples, and techniques the bad guys are currently using so your users don't fall for these attacks.
Experts warn that cybercriminals are using fake Hong Kong Monetary Authority invoices to distribute a piece of malware. The emails are entitled “Invoice #3404196 – Remit File” and they ...
Softpedia published an article I have a problem with. There is so much wrong with this that I don't even know where to start. They started out with:
Last week Adobe announced probably the worst news ever for a tech company. Both their source code and customer lists had been stolen. EPIC FAIL!
Tomorrow, Tuesday October 1, 2013, the first stage of the new health care act kicks in. You can start shopping for policies on new insurance "marketplaces". There is going to be an ...
There is the expression that there are two kinds of companies. The ones that know they are hacked and the ones that don't. It's safe to assume your network has already been compromised ...
This week, the FBI sent out a warning that a strain of malware known as "Beta Bot" can turn off your antivirus, stops access to the websites of antivirus vendors so that your antivirus ...
Steve Ragan over at CSO Magazine wrote:
Rapid7 found 66% of IT professionals conduct user security awareness training to reduce the risk of successful phishing attacks.
One of the most infamous hackers of all time talks about Website security and what users should do to protect themselves. In the world of computer security hackers, few are as well-known ...
A spear-phishing attack, one of the most common and oldest cyber tricks in the book, enabled hackers to hijack and modify the DNS records for several domains on Tuesday, including The New ...
Today it was reported through several sources that a new Cybercrime-as-a-Service option is available: creation of fake scanned passports, ID cards, driver's licenses and fake scanned ...
With the TV show Breaking Bad in its last season, this seems to be a fun title. However, the topic is not all that much fun. You should realize it's not a question of when you will be ...
You would think that by now journalists and people in media and advertising would be on the alert for social engineering red flags. But no. Syrian hacktivists sent a spear-phishing attack ...
Antivirus company Bitdefender reported something important. Here is their blog post of July 17, 2003.
Reuters just reported that Congressional aides in the Senate and House of Representatives said on Thursday that they were notified of a potential security risk involving email and other ...
Ira Winkler and Samantha Manke just wrote a great article at the CSO site about why security awareness programs fail. They started out with: "There is a great dichotomy in Security ...
There is a fascinating article in SC Magazine dated July 3, 2013 which tells the story of Atlantic Media Chief Technology Officer Tom Cochran, who blasted out a simulated phishing email ...
One - Insider Threat: Stealing valuable information for either profit or idealistic motives. Examples: Software developers taking home code for their next job, sales people downloading ...
From the 2013 Verizon Data Breach Investigations Report. Note that i t only takes 20 emails to get one successful click on a phishing attack. Read the story above!
Spear-phishing attacks are up, and they are targeting individuals across all industries, according to a new warning issued by the U.S. Federal Bureau of Investigation .