Home Tags Phishing

Tag: Phishing

Seven in ten UK unis admit being duped by phishing attacks

Not so smart now, eh? Seven in ten UK universities have admitted falling victim to a phishing attack in which an individual has been tricked into disclosing personal details via an email purporting to be from a trusted source.…

Kremlin-backed DNC hackers going after French presidential hopeful Macron

Everyone, everything's a target for mysterious APT28 crew The Russian cyberespionage group blamed for the infamous US Democratic National Committee email leak launched targeted phishing attacks against French presidential candidate Emmanuel Macron's campaign as recently as last month.…

Webroot fixes faulty antivirus update that mistakenly flagged Windows as malware

Windows' system files were flagged as malicious, and Facebook was marked as a phishing site.

AV provider Webroot melts down as update nukes hundreds of legit...

False positives affect Windows Preview, Facebook, and more.

Skype Fixes ‘SPYKE’ Credential Phishing Remote Execution Bug

Microsoft fixed a bug in Skype last month that could have allowed an attacker to execute code on the system it was running on, phish Skype credentials and crash the application.

Researchers claim China trying to hack South Korea missile defense efforts

Deployment of THAAD upsets China, seen as espionage tool.

Google Fixes Unicode Phishing Vulnerability in Chrome 58, Firefox Standing Pat

Google fixed a vulnerability that could've let an attacker carry out phishing attacks with Unicode domains in Chrome but Mozilla is holding off - for now.

Fake Delta Airlines Receipt Packs Malware

Phishing emails, disguised as receipts from Delta Airlines, trick victims into downloading malware.

UK.gov survey shines light on cybersecurity threats to businesses

Phishing, ransomware remain most pressing concerns Phishing and ransomware remain the most pressing security threats for UK business, according to a government-backed survey out Wednesday.…

Personalized Spam and Phishing

Lately we have been noticing an opposite tendency occurring quite often, wherein fraud becomes personalized and spammers invent new methods to persuade the recipient that the message is addressed personally to him.

Thus, in the malicious mailing that we discovered last month, spammers used the actual postal addresses of the recipients in messages to make them seem as credible as possible.

Trust issues: Know the limits of SSL certificates

Certificate authorities (CAs) have given themselves a black eye lately, making it hard for users to trust them.

Google stopped trusting Symantec after discovering the CA had mis-issued thousands of certificates over several years, and researchers found that phishing sites were using PayPal-labeled certificates issued by Linux Foundation’s Let’s Encrypt CA.

Even with these missteps, the CAs play a critical role in establishing trust on the internet.To read this article in full or to leave a comment, please click here

Phishing scammers exploit Wix web hosting

Cybercriminals like to subvert legitimate online services like Google Docs and Dropbox to carry out their malicious activities.

The free website hosting company Wix is the latest addition to the list of services they’ve abused.Researchers from security company Cyren found that scammers were creating phishing sites designed to harvest Office 365 login credentials via Wix, which offers a simple click-and-drag editor for building web pages.

As typically happens with free services, the criminals are taking advantage of these tools to carry out their operations.[ 4 top disaster recovery packages compared. | Backup and recovery tools: Users identify the good, bad, and ugly. ]The phishing site looks like a new browser window open to an Office 365 login page.
In fact, it’s a screenshot of an Office 365 login page with editable fields overlaid on the image. Users would think the site is legitimate and enter the login credentials, except the information is entered into the fields on the overlay and not the actual Office 365 page.To read this article in full or to leave a comment, please click here