X

Category: Social Engineering

Don’t get hooked: Anatomy of a phishing attack

Becoming the victim of a phishing attack is easier than you think. Scammers are lurking…

Cyber-extortion: Why it works and how to fight back

Along with all the scams and cons Internet users have to worry about, there’s also…

Too many phish in the sea: 1.5 million phishing sites created monthly in 2017

There’s a sucker born every minute. How else can you explain that nearly 1.5 million…

Hacked LinkedIn accounts spread new phishing campaign

Yet another dangerous phishing campaign is on the rise, and this time it is being…

Business email compromise attack creating havoc

Sometimes the most effective cyberattacks are those that hack people rather than systems. Business email…

Facebook Messenger hit by massive adware campaign

Facebook Messenger's security has always been suspect, and this new adware campaign only further damages…

U.S. senator urges DMARC implementation to fight phishing attacks

There has been proven success with the DMARC protocol for phishing attack prevention. One U.S.…

Fake UPS malspam delivers two malicious packages

While your IT security blocks many malspam campaigns, this one that purports to be from…

Broken cybersecurity? Don’t fix the users, fix the technology

It's easy to blame the victim when malware hits. But does this broken cybersecurity mean…

Critical energy infrastructure under attack by template injection

Malicious actors have long had their eyes on energy infrastructure. The latest threat against this…