Please turn on your JavaScript for this page to function normally.
Mass manipulation through automated social engineering

In the past few years, social engineering has become cyber attackers’ preferred method for gaining access to target systems, and it usually takes the form of a spoofed …

Security threats to expand in 2012

Attackers are sidestepping automated security technology and are using social engineering and data mining to orchestrate attacks against prominent individuals and their …

Hybrid social engineering attacks

Fraudulent phone calls are increasing in popularity. One possible use for these bogus “bank’ calls is to utilize personal identification information stolen using …

SpyEye Trojan hijacks mobile SMS security for online fraud

A stealth new attack carried out by the SpyEye Trojan circumvents mobile SMS security measures implemented by many banks. Using captured code, Trusteer discovered a two-step …

5 data-stealing apps offered on Android Market

Nearly a month ago, researchers have discovered a Chinese mobile phone monitoring service that allows users to compromise a target’s mobile phone running Symbian or …

Free tool to combat Facebook security issues

Zscaler released a free security tool that protects against malicious threats, scams and spam propagated on Facebook through a technique called “Likejacking.” …

48% of enterprises targeted by social engineering attacks

48% of enterprises have been victims of social engineering attacks, experiencing 25 or more such attacks in the past two years at a average cost of over £15,000 per …

Skype users targeted with calls spreading fake AV

Showing considerable resourcefulness in their attempt to trick Internet users, fake AV peddlers have begun targeting Skype users with an unexpected call. “Attention: …

Evolving cyber threats continue to drive security strategy

43 percent of global companies think they have an effective information security strategy in place and are proactively executing their plans, placing them in the category of …

When scammers socialize

A sophisticated, seemingly broadly orchestrated online scam that promises bogus prizes like iPads or gift cards in order to dupe Internet users into giving up their …

Facebook tool automates syphoning of user data

A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …

Researchers steal 20GB of corporate emails via doppelganger domains

Typosquatting is a well-known phenomena on the Internet. Most users have – at one point or another – misspelled the URL of the site they wanted to visit and were …

Don't miss

Cybersecurity news