Please turn on your JavaScript for this page to function normally.
Human Compromise: The Art of Social Engineering

This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …

Big corporations “hacked” in Defcon social engineering contest

Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …

Chameleon-like fake AV delivered via clever social engineering

A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …

U.S. military contractors targeted with malicious PDFs

The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …

Google+ related scams move to Facebook

Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …

Security threats: Unwrapping 2011

2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …

First social engineering protection appliance

Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …

Romanian president declared dead by e-mail scam

BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …

Cybercrime statistics show widespread phishing problem

The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …

Fake AV spreading via Yahoo! Answers

From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …

Facebook scammers go back to using Javascript

Facebook scammers know that in order to keep users falling for their scams, they have to use a variety of approaches. For example, there was a time where rogue applications …

Social media threats and targeted attacks

In the video below, Alexandru Catalin Cosoi, the Head of Online Threats Lab at BitDefender, talks about the new breed of social media threats and sophisticated targeted …

Don't miss

Cybersecurity news