Browsing Category: Social Engineering

[img_assist|nid=2167|title=|desc=|link=none|align=right|width=100|height=100]The Cisco Cybercrime Return on Investment Matrix identifies the
innovative and lucrative banking Trojan Zeus, as well as successful Web exploits that have dominated cybercrime as
“rising stars.” Read the full article. [TechTarget]

Read more...

[img_assist|nid=2149|title=|desc=|link=none|align=left|width=100|height=100]U-Test has just completed a substantive, independent review of three major e-tailing sites–Amazon, Walmart and Target– and found a gaping cross-site scripting security hole in one of them. Read the full article. [The Last Watchdog]

Read more...

[img_assist|nid=2103|title=|desc=|link=none|align=left|width=100|height=100]Two Bulgarians have been sentenced for their roles in an online
money-laundering scheme that collected about $1.2 million from U.S.
residents and sent it to a criminal group in Eastern Europe, the U.S.
Department of Justice said. Read the full article. [Computerworld]

Read more...

[img_assist|nid=2105|title=|desc=|link=none|align=right|width=100|height=100]Although the combined number of reported data breaches in the
government and the military has dropped in 2009 compared to last year,
many more records were compromised in those breaches, according to
recent figures compiled by the Identity Theft Resource Center. Read the full article. [Government Technology]

Read more...