Forget about data stealing trojans. Unidentified thieves got a hold of top secret plans for a joint French-British drone aircraft project the old fashioned way: by snatching an executive’s briefcase at a Paris train station.
Browsing Category: Social Engineering
A domain registered two days ago as groupon500.com, which claims to offer a $500 voucher toward Groupon or its primary competitor, LivingSocial, is actually registering users for ‘free’ trial offers that aren’t free at all. The best part, however, is that everything about this scam is perfectly legal according to Zscaler’s Julien Sobrier.
Google is in the process of developing a tool to help users generate strong passwords for the various and sundry Web sites for which they need to register and authenticate. The password-generator is meant to serve as an interim solution for users while Google and other companies continue to work on widespread deployment of the OpenID standard.
Cybercriminals continue targeting customers of Stratfor, the well-known, Texas-based security and policy think-tank hacked by Anonymous on Christmas, according to a TechNet report.
A shadowy web of malicious networks, or “malnets” will be the source of two thirds of online attacks in 2012, according to a report from the security firm Blue Coat.
A whopping 97 percent of fake Facebook profiles purport to be female, according to this infographic based on a new study, announced today, from security firm Barracuda Networks. In order to expand their networks and entice would-be victims, 58 percent of the phony profiles also claim to be bisexual and on average, have 726 friends while 68 percent claim to have attended college.
CANCUN–Facebook is a lot of things, and one of the things that it’s become of late is a fertile green field for attackers and scammers of all stripes. The Koobface worm is perhaps the most famous threat to hit the network, but the more mundane ones, such as scammers generating fake profiles automatically to spread spam and malicious URLs are becoming more and more prevalent, researchers say.
A new email-based threat is capable of infecting a machine even without opening any attachments within, according to a report from the Daily Mail.
Researchers have identified a strain of malware that’s being used in a string of targeted attacks against defense contractors, government agencies and other organizations by leveraging exploits against zero-day vulnerabilities. The attacks may have been going on since 2009 in some form and the emails containing the malicious attachments are specifically targeted at executives and officials in various industries using fake conference invitations.
A new banking Trojan variant can bypass CAPTCHA, as demonstrated by a video posted today by security firm Websense on their Security Labs blog.