Please turn on your JavaScript for this page to function normally.
Researchers steal 20GB of corporate emails via doppelganger domains

Typosquatting is a well-known phenomena on the Internet. Most users have – at one point or another – misspelled the URL of the site they wanted to visit and were …

Human Compromise: The Art of Social Engineering

This book teaches you the “how-to” of social engineering. Taking a hands-on approach, you will learn everything from the field-tested methods for reading body …

Big corporations “hacked” in Defcon social engineering contest

Most of the recent high-profile cyber attacks against corporations and government organizations have one thing in common – they all started with a successful social …

Chameleon-like fake AV delivered via clever social engineering

A very complex and likely very efficient fake AV spreading campaign has been spotted targeting Facebook users. It starts with users being apparently contacted by one of their …

U.S. military contractors targeted with malicious PDFs

The last few months have seen a lot of cyber attacks aimed at U.S. military contractors and they are still ongoing. F-Secure researchers have recently spotted an email …

Google+ related scams move to Facebook

Scammers continue to take advantage of the great interest raised by the introduction of Google+ and have begun tricking Facebook users into giving them access to their …

Security threats: Unwrapping 2011

2011 has been a busy year so far for cyber criminals. No one can say IT security incidents went under reported, they have certainly been prominent in the headlines. HBGary …

First social engineering protection appliance

Highly targeted social engineering attacks have become the new vector of choice for adaptive persistent adversaries as an undetected entry point to enterprise networks, with …

Romanian president declared dead by e-mail scam

BitDefender discovered a spam wave using the Romanian president’s image to help spread malware. The unsolicited e-mail relies on a classic combination of social …

Cybercrime statistics show widespread phishing problem

The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services, according to KnowBe4. Using the Inc.com …

Fake AV spreading via Yahoo! Answers

From poisoned Google image search results to poisoned answers to legitimate questions on Q&A sites like Yahoo! Answers and public forums, malware peddlers are determined …

Facebook scammers go back to using Javascript

Facebook scammers know that in order to keep users falling for their scams, they have to use a variety of approaches. For example, there was a time where rogue applications …

Don't miss

Cybersecurity news