social engineering
What happens when a scammer tries to scam a security researcher?
I just got off the phone with a very nice gentleman from the “service center for the Windows operating system computers.” During the call, he informed me that they …
US agency employees let invented woman expert into the network
Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be …
Fake LinkedIn profile gathering info for targeted attacks
Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust. An ongoing social engineering …
When the phone call is more dangerous than malware
During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and …
Fake Whatsapp notification delivers malware
WhatsApp is one of the most popular instant-messaging services out there, and its huge user base (over 300 million active users) makes Whatsapp-themed spam a great way to …
How to social engineer a social network
Social engineering has for a while now been cyber attackers’ best bet to enter systems and compromise accounts when actual hacking doesn’t work, or when they …
Convincing “Urgent Windows Error Fix” phishing email doing rounds
A pretty convincing email phishing campaign is targeting one of the largest user bases out there – those who use Microsoft’s Windows OS – by taking advantage …
Bogus AmEx “Unusual activity detected” email leads to phishing
An extremely thorough phishing campaign is currently targeting American Express customers by trying to make them believe that access to their account will be restricted within …
Cross-platform Frutas RAT delivered via targeted emails
The cross-platform Frutas RAT is being used in a new email phishing campaign targeting high-profile finance, mining, and telecom companies as well as governments in Europe and …
Chrome, Firefox users targeted with account-hijacking plugins
Hijacked social networking accounts can be monetized in a number of ways, so cyber crooks are always thinking up new ways of doing so, preferably without the user noticing. …
Preventing the exploitation of human vulnerabilities
Secure Mentem released the Human Incident Response Service to specifically address the issue of exploiting human vulnerabilities. Some of the most noted attacks in recent …
Social engineering tops list of help desk security threats
Help desks are most commonly asked to assist users in addressing common IT problems including password resets and application and connectivity issues. Often the performance of …
Featured news
Resources
Don't miss
- Back to basics webinar: The ecosystem of CIS Security best practices
- SonicWall firewalls targeted in ransomware attacks, possibly via zero-day
- AIBOMs are the new SBOMs: The missing link in AI risk management
- Average global data breach cost now $4.44 million
- Open-source password recovery utility Hashcat 7.0.0 released