Protect yourself from Olympic phishing scams
Nobody yet knows for certain whether they have been allocated 2012 Olympic event tickets. Until June 24, when confirmations arrive, there remains the risk that some people …
Free web hosting is a boon to phishers
Sometimes it seems that every legitimate service offered online can be misused by phishers, scammers and cyber criminals in general. Free mail services are abused to send out …
Microsoft investigates emerging Internet phone scam
An Internet scam that targets English-language markets and costs victims on average $875, according to Microsoft. The scam works by criminals posing as computer security …
Malware activity hitting peaks of 10 million pieces per day
Virus and malware activity increased during the month of May, sporadically hitting peaks of more than 10 million pieces per day, according to AppRiver. Major news events, once …
Cybercriminals targeting sporting events and music festivals
BitDefender identified a series of scams targeting music festival goers, sporting event fans and holidaymakers this summer. The top summer-themed spam messages for 2011 relate …
How search engine poisoning works
Imperva disclosed the intricate workings of a Search Engine Poisoning (SEP) campaign. The attack was extremely successful and continued to run for at least 15 months without …
Skimming gang indicted, facing over 60 years in prison
Four people have been charged of conspiracy to commit bank fraud, conspiracy to commit access device fraud, aggravated identity theft and bank fraud in the Manhattan federal …
Bank not to blame for customer’s heavy losses from fraudulent transactions
A magistrate recommendation that is likely to become an official ruling could set a legal precedent welcome to banks all over the US, saying they are are not accountable for …
Sony Pictures warns its customers about spear phishing
Following last week’s breach executed by LulzSec, Sony Pictures has finally issued a consumer alert and seems also to have sent it to the addresses of approximately …
Gmail deactivation spam run leads to phishing forms on Google Docs
A week ago, F-Secure researchers have uncovered a number of spreadsheets with a form functionality that are apparently designed to act as phishing forms. Today, one of these …
Fake AV distributed via user profiles on popular sites
An investigation into the methods of distibution of the FakeRean familiy of fake AVs has revealed some interesting facts, says GFI. In order to lure people into downloading …
First social engineering protection appliance
Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …
Featured news
Sponsored
Don't miss
- How to make Infrastructure as Code secure by default
- Suspect arrested over the Transport for London cyberattack
- Adobe completes fix for Reader bug with known PoC exploit (CVE-2024-41869)
- Losses due to cryptocurrency and BEC scams are soaring
- Top priorities for federal cybersecurity: Infrastructure, zero trust, and AI-driven defense