Like they do with major news events and other holidays, online fraudsters are seeking to cash in on the upcoming Memorial Day weekend.
Following a series of high-profile Twitter account hijacks, the microblogging service finally has delivered two-factor authentication.
The number of fraud complaints lodged with the Internet Crime Complaint Center actually fell in 2012, but the amount of alleged losses to victims rose.
The Anti-Phishing Working Group found that 47 percent of all phishing attacks involve shared web hosting, like one might find on WordPress or Joomla.
Spam campaigns are sending out spurious emails purported to be from Facebook, LinkedIn, American Airlines and financial institutions, McAfee researchers found.
The unsuccessful attacks were the result of email addresses being publicly posted on an electric company's website.
Security researchers have found evidence that, not surprisingly, social engineering tactics were leveraged by the attackers, who set their malware to "go off" three days after reaching victims.
The Federal Trade Commission and the Better Business Bureau are alerting businesses about the new threat.
Twitter announced Thursday that is adopting Domain-Based Message Authentication, Reporting and Conformance (DMARC), a new specification designed to authenticate emails so users don't fall for fraudulent emails.
Security firm Seculert is tracking two versions of the threat: one which is targeting Japanese organizations and the other directed, ironically, toward Chinese journalists.
The concept of "bouncer list phishing" is designed to keep everyone, except a select few, on the outside of the campaign.
A Turkish certificate authority (CA) accidentally issued two intermediate, or chained, digital certificates, one of which was used by the holder to mimic legitimate websites and launch attacks.
Phishing emails targeting victims of Sandy begin to make the rounds online.
Scammers use a click-the-pic ruse to redirect users to the Blackhole exploit kit
With Hurricane Sandy on a collision course with the Northeast, cyber crooks are likely to take advantage of the historic storm to make a quick buck or steal personal information from the unsuspecting.
Researchers have uncovered information about the origins of "Operation High Roller," a campaign targeting victims in the United States and the Netherlands with banking trojans to carry out ACH fraud.
Best practices for mobile devices highlighted rising threats in a market where BYOD has become standard.
An "open-redirect" vulnerability has allowed scammers to phish several thousand people using shortened links to legitimate government websites.
With less than a month remaining until the presidential election, online fraudsters are smelling opportunity, and more similarly themed cons are expected in the upcoming weeks.
Over the course of a week, two trojan-spreading scams have emerged that aim for users of the internet phone service.
Researchers believe watering hole strategies, where attackers compromise sites visited by their targets, are used to steal personal information and set the stage for spear phishing attacks.
Last month's featured news from Shamoon attacking oil companies to Wyndham Hotels challenging the FTC.
Successful phishing attacks in 2012 include words that allude to shipping and urgency, according to a new report.
Thousands of individuals may have had their personal information exposed after hackers used a successful phishing attack to springboard to an email server belonging the Kentucky Department for Community Based Services.
The personally identifiable information found on social networks are a gateway for hackers to get access to the heart of the information they truly desire.
Researchers at security firm Cloudmark have seen a 913 percent increase in daily SMS phishing reports.
Phishing is at an all time high, but Axway believes its email security solution is the answer. They're looking to take home a big award at the upcoming SC Awards.
We need to consider all of the traditional facets of information security when we consider protecting information on the internet.
Fraudsters are capitalizing on the trusted names of two major smartphone providers to spread malware.
Tried-and-true phishing scams continue to win a psychological game with victims, and have hit Canada particularly hard.