social engineering
Which malware lures work best?
“More often than not, malware peddlers’ main goal is to deliver their malicious wares to the maximum number of users possible. Choosing the right lure is crucial …
Banking Trojan delivered to companies via macro-based malware
“Cybercriminals continue targeting enterprises with malicious emails whose ultimate goal is to infect company computers with the Dyre/Dyreza banking malware. But instead …

How attackers exploit end-users’ psychology
At RSA Conference 2015, Proofpoint released the results of its annual study that details the ways attackers exploit end-users’ psychology to circumvent IT security.Last …
Cyber crooks go after enterprise millions with Dyre malware, social engineering
“An experienced and resource-backed cybercrime gang” is using the relatively new Dyre/Dyreza banking Trojan coupled with effective social engineering to steal …
How cybercriminals hack our brains
Cybercriminals are increasingly using persuasion techniques in order to manipulate employees to do things they normally wouldn’t, usually resulting in the loss of money …
The psychology of Facebook scam victims
A two-year study of over 850,000 Facebook scams by antivirus software provider Bitdefender has revealed that scammers have infected millions of users with the same repackaged …
iCloud wasn’t hacked, says Apple
Apple has released a statement denying that iCloud was hacked to steal nude photos of celebrities. “When we learned of the theft, we were outraged and immediately …
Social Engineering Penetration Testing
We know that the human element is often the weakest link in the security chain, and that attackers - whether they are after money, user information, corporate or state secrets …
A look at advanced targeted attacks through the lens of a human-rights NGO, World Uyghur Congress
In my capacity as an academic researcher at Northeastern University, I collaborated with computer scientists Stevens Le Blond, Adina Uritesc and Cedric Gilbert at the Max …
The psychology of phishing
Phishing emails are without a doubt one of the biggest security issues consumers and businesses face today. Cybercriminals no longer send out thousands of emails at random …
IT security training: Be proactive
Security is a fast paced industry. You only need to use the Internet for a short time to understand how and why the activities of digital criminals pose a real and significant …
French orgs targeted with social engineering attacks
Over the last year, Symantec researchers have been following and warning about exceptionally effective and sophisticated malware delivery / phishing campaigns that have been …
Featured news
Resources
Don't miss
- June 2025 Patch Tuesday forecast: Second time is the charm?
- Why IAM should be the starting point for AI-driven cybersecurity
- Protecting patient data starts with knowing where it’s stored
- Ransomware and USB attacks are hammering OT systems
- Meta open-sources AI tool to automatically classify sensitive documents