Apple-related phishing and online banking malware increase
As the holiday season approaches, Trend Micro is raising concern about the ongoing proliferation of Apple iOS phishing sites, as well as a sizable uptick in online banking …
Top 12 scams of the holiday season
McAfee released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take …
Cybercrime gangs seek victims in untapped markets
A record number of brands were targeted by phishers in the second quarter of 2013, according to APWG. A total of 639 unique brands were targeted by phishing attacks in the …
What happens when a scammer tries to scam a security researcher?
I just got off the phone with a very nice gentleman from the “service center for the Windows operating system computers.” During the call, he informed me that they …
Convincing “Urgent Windows Error Fix” phishing email doing rounds
A pretty convincing email phishing campaign is targeting one of the largest user bases out there – those who use Microsoft’s Windows OS – by taking advantage …
Bogus AmEx “Unusual activity detected” email leads to phishing
An extremely thorough phishing campaign is currently targeting American Express customers by trying to make them believe that access to their account will be restricted within …
Bogus Facebook login page steals credentials, pushes malware
Symantec researchers have recently stumbled upon a phishing site that packs a double whammy: the site asks the user either to log into Facebook or to download an app in order …
PureVPN users receive fake email saying authorities closed down the service
Over the weekend, customers of Hong Kong-based VPN service PureVPN were taken aback by an email that was seemingly sent by the company’s founder Uzair Gadit, saying that …
Connections between personality types and phishing
Phishing scams are some of the most effective online swindles, hooking both savvy and naive computer users. New insights from researchers at the Polytechnic Institute of New …
Cybercriminals exploit most news within 22 hours
Cybercriminals continue to respond with lightning speed when they see an opportunity to exploit a national or global news story to spread malware. In fact criminals are …
Survey highlights ignorant IT behavior in the workplace
You receive a strange email. It looks shady. You’re probably being phished – a hacker is attempting to gain access to your enterprise. They must want to hijack …
Unofficial Android iMessage app can steal info and download malware
Android users who have dreamed about being able to use iMessage, Apple’s proprietary and free messaging solution, have been pleasantly surprised by the iMessage Chat for …
Featured news
Resources
Don't miss
- Why your security team feels stuck
- It’s time to give AI security its own playbook and the people to run it
- Kanvas: Open-source incident response case management tool
- 6 eye-opening books on AI’s rise, risks, and realities
- Check for CitrixBleed 2 exploitation even if you patched quickly! (CVE-2025-5777)