Items tagged with Phishing
Do you know when thieves leave their stolen goods out on the front porch for all to see, just because? We didn't think so. Sometimes hackers can be the dumber equivalent of thieves, as we have now found out. It appears that hackers behind a global phishing campaign did not protect their stolen goods and left them out...
Read more...
In the early days of the COVID-19 pandemic, IBM created a global security task force, called X-Force, dedicated to threat intelligence and analysis for organizations that are part of the vaccine supply chain. The work the task force has put forth has apparently yielded success as the group just announced that it...
Read more...
We are all adapting to life amid a pandemic, with many people working from home as COVID-19 continues to spread. But it is not just newfound telecommuters who are adapting. So are malware authors, who are changing their lures in attempts to hook victims through phishing emails. New data suggests that Microsoft is now...
Read more...
As we have said before, these are challenging times as we all adapt to the reality of a deadly virus and keeping our distance from one another to slow its spread. Making matters worse, nefarious actors are pouncing on the opportunity to spread malware. This means you need to be extra cautious about falling for a...
Read more...
Anyone with a modicum of security sense knows that if you get an email that looks suspicious, you don't click on any included links. Most people also know to watch out for phishing scams that come in via social networks -- phishing attacks are expected in these mediums. What many might not expect is to run across phishing links in their Google
Read more...
In an ongoing effort to stay one step ahead of the bad guys (or at least keep pace with them), Google has decided to block sign-ins from embedded browser frameworks, such as the Chromium Embedded Framework (CEF). The new policy will go into effect in June, so developers have a couple of months to adjust.
This is...
Read more...
Phishing attacks have become one of the most common methods of scamming unsuspecting people out of something - usually money. We may all think we have our guards up to all forms of attacks, but when they can hit us through every form of communication, it's bound to happen to someone.
In a recent series of phishing...
Read more...
Everyone has to deal with scams and phishing attempts online today, even Google. To protect its workers from phishing scams that could result in the theft of IP, Google took advantage of security keys for all its 85,000 workers. Since that roll out, no accounts have been compromised. The keys are USB-based security...
Read more...
The nasty WannaCry outbreak has us all a little bit on edge. It also serves as a sobering reminder that a simple phishing scam can still create quite a bit of havoc. Sure, savvy PC users know better than to click on mysterious URLs in emails and instant messages, but for the bad guys, it's simply a numbers game—throw...
Read more...
Every savvy computer user knows to be wary of things like email attachments and hyperlinked text, especially (though not solely) when receiving an unexpected communication. It does not matter if the communication comes from a trusted source or not. In case anyone needs reminded of this, there is yet another phishing...
Read more...
If you're using Google's Chrome browser as your primary vehicle to surf the web, you may want to think about temporarily parking it and puttering around in something else. That's because the most recent version of Chrome is vulnerable to a devious phishing attack, one that is capable of spoofing a legitimate website...
Read more...
As if hackers do not already have an easy enough time duping Internet users into forking over personal information, it turns out that browser autofill profiles may be helping them out when they're supposed to be making things more convenient for the person who inputted his information. By implementing hidden fields on...
Read more...
Google has a message for webmasters serving up malware and it goes something like this: Fool me once, shame on you. Fool me twice, shame on me. Going forward, Google is plugging what it calls a "gap" in its online protection scheme that allowed sites serving up malicious content to become repeat offenders without much...
Read more...
Twitter needs to get a handle on its Promoted Tweets feature and it needs to do it quickly. The problem has to do with vetting, or lack thereof. We don't know how widespread the problem is, but there is at least one Promoted Tweet going around that is nothing more than a phishing scam preying on the desire of Twitter...
Read more...
There are many different ways of hacking into a person's email account. Some are rather sophisticated and involve a lot of effort, while on the end of the spectrum a scheme known as phishing is one of the easiest methods—all you need is a cooperative victim with limited technical savvy. Hackers found both in John...
Read more...
We talk a lot about the importance of businesses beefing up security to protect from the threat of those who might want to gain access to internal networks. Last week, we were given another great example of why: an integral piece of Linux software suffered a bug that at first seemed modest but turned out to be quite...
Read more...
Computer hackers accessed personally identifiable information and financial details belonging to around 1,400 University of Virginia workers as part of an email phishing scam, the University announced. An internal investigation determined that the culprits first accessed the stolen records in early November 2014 and...
Read more...
ICANN, a non-profit organization that is responsible for looking after the names and domains of the Internet, announced that it has suffered a serious phishing attack that compromised its data.
An investigation is underway, but ICANN believes that it was the victim of a “spear phishing” attack that was first...
Read more...
Another day, another exploit/attack/hack/breach/phishing scam to worry about. This one concerns Valve’s Steam Guard Protection and a new phishing scheme that, if successful, allows a cybercriminal to steal a file that will bypass the Steam Guard Protection and allow the thief to log in to the victim’s account from any computer....
Read more...
Symantec, which has been making antivirus products for decades (including Norton, the first piece of software most people would try to remove from a new PC), is getting out of the antivirus game, sort of. Brian Dye, Symantec's senior vice president for information security, told the Wall Street Journal that in...
Read more...
We live at a quizzical time in technology. The tech boom has revolutionized the world, and the innovations that are pouring out of brilliant minds are incredible in both their frequency and content. But there is also a backlash against a lot of technology, perhaps highlighted best by the curious rage that Google Glass...
Read more...
Kaspersky released its Safe Browser for Windows Phone, months after putting out the same product for iOS and days after making a similar one for Android. The app does exactly what you think it does, by blocking access to potentially dangerous sites with a warning page to protect against phishing attacks. Designed for both personal and corporate...
Read more...