Incentivized by a minimal amount of cash, computer users who took part in a study were willing to agree to download an executable file to their machines without questioning the potential consequences.
Browsing Category: Social Engineering
Banker Trojans have proven to be reliable and effective tools for attackers interested in quietly stealing large amounts of money from unwitting victims. Zeus, Carberp and many others have made piles of money for their creators and the attackers who use them, and researchers have been looking at a newer banker Trojan that has the[...]
The hackers behind last month’s iPhone ransomware campaign – in which many users were asked to pay $100 to unlock their devices – may be behind bars now.
A phishing campaign has been detected that sends victims Dropbox links leading to a .zip file hosting the Zeus banking Trojan.
Iranian spies have been carrying out a campaign since at least 2011 that has gathered intelligence by targeting D.C. journalists and government emissaries via social media.
Twitter has made a couple of changes to the service’s login process to help prevent account takeovers and enable users to reset their passwords in a simpler way. A Twitter account is among the more valuable assets for an attacker who is targeting a specific person. Accounts typically are tied to a user’s main email[...]
UPDATE–Ransomware has been wreaking havoc on desktops for many years now, with attackers demanding that victims pay a fee to unlock the infected system. This kind of malware hasn’t been a huge issue yet on mobile devices, but that’s beginning to change, albeit slowly. A new piece of mobile malware targeting Android is being sold by the same group responsible[...]
A serious vulnerability in both the OAuth and OpenID protocols could lead to complications for those who use the services to login to websites like Facebook, Google, LinkedIn, Yahoo, Microsoft, PayPal among many others.
A recent VoIP phishing campaign has been netting the payment card information of up to 250 Americans per day.
An email phishing scam uses a realistic-looking Apple login page in order to pilfer Apple ID usernames and passwords before moving on to steal user credit card information.