X

Category: Social Engineering

W-2 phishing scams on the rise

It’s tax season in America and cybercriminals want to cash in. The FBI says beware…

Mobile security threats that will cause you sleepless nights in 2018

Mobile devices are not only for personal use anymore. They are a vital part of…

New threat vector: Latest Microsoft Word malware doesn’t use macros to unleash attack

Macros are usually the top choice for hackers looking to infect a system via Microsoft…

Fool’s gold: Ethereum social engineering scammers snag gullible Twitter users

Who are the latest trying to cash in on the cryptocurrency craze? Criminals, of course,…

Intel AMT security exploit allows hacks in under a minute

A newly discovered Intel AMT security exploit could allow criminals to hack laptops in under…

Don't get hooked: Anatomy of a phishing attack

Becoming the victim of a phishing attack is easier than you think. Scammers are lurking…

Cyber-extortion: Why it works and how to fight back

Along with all the scams and cons Internet users have to worry about, there’s also…

Too many phish in the sea: 1.5 million phishing sites created monthly in 2017

There’s a sucker born every minute. How else can you explain that nearly 1.5 million…

Hacked LinkedIn accounts spread new phishing campaign

Yet another dangerous phishing campaign is on the rise, and this time it is being…

Business email compromise attack creating havoc

Sometimes the most effective cyberattacks are those that hack people rather than systems. Business email…