Please turn on your JavaScript for this page to function normally.
Beware of Android Defender mobile scareware

Scareware aimed at mobile users is not nearly as ubiquitous as that directed at those who use Windows-run PCs. Nevertheless, there is some out there. Sophos’ Paul …

“NATO vacancies” phishing email also leads to malware

An interesting and very comprehensive phishing and malware-delivery campaign has been spotted by Webroot researchers. The attackers are posing as the chief of NATO’s …

Cyber espionage campaign uses professionally-made malware

Trend Micro researchers have discovered a new, massive cyber espionage campaign that has been hitting as many as 71 victims each day, including government ministries, …

Malware you can “live with”, but shouldn’t

The main symptom of a computer being infected with the ZeroAccess (or Sirefef) malware is that online searches via Google Search often lead to unhelpful pages filled with ads …

UK banks targeted with Trojans and social engineering

According to Etay Maor, Fraud Prevention Solutions Manager for Trusteer, “The security industry has a common saying: “Your system is only as secure as its weakest …

The Social-Engineer Toolkit 5.0 released

TrustedSec released the Social-Engineer Toolkit (SET) 5.0 codename: The Wild West. This version is a culmination of six months of development, bug squashing, and user …

Spear-phishing emails targeting energy companies

Information over-sharing can lead to cleverly executed and dangerous spear-phishing campaigns, warns the US Department of Homeland Security and the ICS-CERT. According to an …

My very own personal privacy training

I remember a time – and it wasn’t even that long ago – when the government, companies and organizations weren’t this hell-bent on collecting citizen, …

Ransomware uses browser history to persuade users to pay up

A new ransomware variant dubbed Kovter has been spotted trying out a brand new approach for convincing targeted users of the legitimacy of its claims. According a malware …

Cloud-based tool simulates social engineering

TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …

Xbox Live accounts hack performed by attackers that hit Krebs and Honan?

Microsoft has confirmed that a number of Xbox Live accounts of their current and former employees have been compromised by attackers using “several stringed social …

(IN)SECURE Magazine issue 37 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 37 has been released today. Table of contents: …

Don't miss

Cybersecurity news