Please turn on your JavaScript for this page to function normally.
Cloud-based tool simulates social engineering

TraceSecurity launched the TraceSecurity Phishing Simulator, a secure, cloud-based solution that allows organizations to safely perform on-demand social engineering tests that …

Xbox Live accounts hack performed by attackers that hit Krebs and Honan?

Microsoft has confirmed that a number of Xbox Live accounts of their current and former employees have been compromised by attackers using “several stringed social …

(IN)SECURE Magazine issue 37 released

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 37 has been released today. Table of contents: …

Yahoo Mail accounts still hijacked daily

Email account hijacking has been a big problem for Yahoo Mail users since the beginning of the year, as a number of vulnerabilities have been discovered, shared online and …

Warning from “Mark Zurckerberg” leads to account hijacking

If you get an email sent by “Mark Zurckerberg”, saying your Facebook account might be permanently suspended because of violations of the social network’s …

Real world social engineering challenge at HITBSECCONF2013

Global IT services provider Sogeti will launch their social engineering challenge during the Hack In The Box Amsterdam conference in April. The challenge will be to social …

Uyghur Mac users targeted with spear-phishing emails

Uyghur activists are, once again, targeted with spear-phishing emails whose goal is to set up a backdoor on the victims’ computers. The Uyghurs are a Turkic ethnic …

Comment Group hackers specialize in high-profile targeted attacks

It is common knowledge that spear-phishing has become the preferred way for persistent attackers to gain a foothold in targeted systems and network. In fact, most of the …

Social engineering: Clear and present danger

Although many companies in the information security industry prefer to tackle challenges with sophisticated hardware, the art of lying continues to be a towering risk …

Cybergangs embracing crimeware over social engineering

The APWG reports that there was a constant decline in the number of traditional phishing websites through September 2012, counterfeits usually impersonating well-known …

Wombat unveils social engineering security training module

Wombat released its social engineering training module to defend against social engineering threats, including spear phishing and social media-based attacks. Commonly defined …

Ransomware demands survey completion instead of cash

Ransomware has replaced fake AV as the most high-profile and annoying malware targeting computer users around the world, and the approach is always the same: the owners of the …

Don't miss

Cybersecurity news