A new bill introduced to the U.S. House of Representatives would make it illegal for employers and other institutions to require Social Media passwords from their employees.
Browsing Category: Social Engineering
A German court ruled earlier this week that victims of phishing scams, and not banks, are responsible for money lost in online scams.
Threatpost has spoken before with Carnegie Mellon University professor Alessandro Acquisti, one of the country’s leading authorities on the impact of social networks and emerging technologies on privacy. In a talk last week at Stanford University’s Center for Internet and Society titled “Privacy in the Age of Augmented Reality,” the professor who specializes in the economics of privacy, shares his research on how loose privacy protections affect how people conduct themselves on social networks.
A new survey conducted by AVG Technologies revealed that a solid majority of American parents admit that they have secretly accessed the Facebook profiles of their children.
A new scareware-ransomware hybrid attempts to convince users they are being sued in violation of the Stop Online Piracy Act (SOPA) and offers to remedy the problem if users purchase a fake antivirus solution.
[img_assist|nid=10958|title=Justin Morehouse|desc=|link=none|align=right|width=100|height=100]Corporate executives and other high value employees traveling abroad need to be on guard for attempts to compromise their mobile devices, and could even have their mobile phone compromised before they even disembark the plane following their arrival, according to security researcher Justin Morehouse. A thirst for intellectual property and trade secrets, and a bugeoning market of sophisticated mobile surveillance tools means that executives need to begin thinking and acting like spies in order to avoid being spied upon themselves, according to a presentation at the OWASP AppSec DC 2012 conference in Washington DC on Thursday.
Good Samaritans are few and far between when it comes to lost cell phones, according to the conclusions of a social experiment conducted by security firm Symantec. Smart phones are unlikely to be returned by those who find them, but very likely to be perused for sensitive data including photos, social media applications and banking applications.
Cybercriminals are targeting US Airways customers with malicious spam emails containing a link that, once clicked, initiates a series of redirects, eventually leading users to a domain hosting the Blackhole exploit kit.
The twice-shut-down Kelihos botnet remains active and continues spamming with a new variant, despite yesterday’s efforts by Kaspersky Lab and CrowdStrike that knocked offline and sinkholed the most recent version of the botnet.
Money mules – the accomplices who help move stolen funds – may be the real victims of online banking scams, not the bank customers who are the ostensible targets of fraudsters, according to new research from Microsoft.