Please turn on your JavaScript for this page to function normally.
Fraudsters steal nearly $47 million from Ubiquiti Networks

US networking technology company Ubiquiti Networks has been swindled by fraudsters and has lost nearly $47 million.According to the quarterly financial report the company …

Nigerian scammers are stealing millions from businesses

When someone mentions advanced fee or romance scams most people immediately associate them with Nigerian scammers. But there is another type of scam that these fraudsters …

Which malware lures work best?

“More often than not, malware peddlers’ main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial …

Banking Trojan delivered to companies via macro-based malware

“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware. But instead …

Head
How attackers exploit end-users’ psychology

At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …

Cyber crooks go after enterprise millions with Dyre malware, social engineering

“An experienced and resource-backed cybercrime gang” is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal …

How cybercriminals hack our brains

Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …

The psychology of Facebook scam victims

A two-year study of over 850,000 Facebook scams by antivirus software provider Bitdefender has revealed that scammers have infected millions of users with the same repackaged …

iCloud wasn’t hacked, says Apple

Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities. “When we learned of the theft, we were outraged and immediately …

Social Engineering Penetration Testing

We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …

A look at advanced targeted attacks through the lens of a human-rights NGO, World Uyghur Congress

In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max …

The psychology of phishing

Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals no longer send out thousands of emails at random …

Don't miss

Cybersecurity news