social engineering
Human Compromise: The Art of Social Engineering
This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …
Big corporations “hacked” in Defcon social engineering contest
Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …
Chameleon-like fake AV delivered via clever social engineering
A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …
U.S. military contractors targeted with malicious PDFs
The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …
Google+ related scams move to Facebook
Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …
Security threats: Unwrapping 2011
2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …
First social engineering protection appliance
Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …
Romanian president declared dead by e-mail scam
BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …
Cybercrime statistics show widespread phishing problem
The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …
Fake AV spreading via Yahoo! Answers
From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …
Facebook scammers go back to using Javascript
Facebook scammers know that in order to keep users falling for their scams, they have to use a variety of approaches. For example, there was a time where rogue applications …
Social media threats and targeted attacks
In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …
Featured news
Sponsored
Don't miss
- Prompt Fuzzer: Open-source tool for strengthening GenAI apps
- How insider threats can cause serious security breaches
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap