Please turn on your JavaScript for this page to function normally.
Mobile phishing geared towards online banking users

When it comes to deploying phishing sites designed to trick mobile users, the great majority of cyber criminals opts for targeting those who engage in e-banking and e-commerce …

SmishGuru simulated attack service launches

Wombat released SmishGuru, a simulated attack service for security officers to train employees how to recognize and avoid the most subtle yet potentially harmful smishing …

Phishing campaigns run rampant on social networks

In January, GFI threat researchers identified a number of social network-based cybercrime attacks, including phishing messages on Twitter and Facebook, as well as malicious …

People worry more about being phished at home than at work

In a corporate world where workers are bombarded with an average of 6 phishing emails everyday and 60% of people fall for them, research released by PhishMe has found that …

Comment Group hackers specialize in high-profile targeted attacks

It is common knowledge that spear-phishing has become the preferred way for persistent attackers to gain a foothold in targeted systems and network. In fact, most of the …

Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

Bogus money transfer notice leads to theft of online banking credentials

Symantec researchers have recently spotted an email phishing campaign impersonating the accounting department of a random firm. “Dear Sir,” says the email, …

Twitter users hit with typo-squatting phishing campaign

In the wake of last week’s compromise of 250,000 Twitter accounts comes another threat to Twitter users: phishing messages – both DMs and tweets – that lure …

Learn by doing: Phishing and other online tests

As a tech-savvy person in a family that mostly consists of low level Internet users – and especially because of my line of work – I’m often tasked with …

Red October: The hunt for data

The recent discovery of the Red October malware has focused a lot on its effects, but inadequate attention has been given to its purpose – which successfully evaded …

Cybergangs embracing crimeware over social engineering

The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …

Aerospace and defense firms targeted with clever spear phishing

Directors, vice presidents and other top management of companies in the aerospace industry and U.S. government and defense contractors have recently been targeted with a …

Don't miss

Cybersecurity news