Social Engineering

Hackers steal $50k from Australian real estate agency

By

Cyber criminals have stolen $50,000 from an Australian real estate agency after one of its employees was duped through social engineering.

Boston Marathon blasts breed malware ruses, surge in dubious websites

By

As expected, the web's unscrupulous element is taking advantage of the attention surrounding the Boston Marathon bombings to spread malware and trick people into donating to fake causes.

How to avoid being hacked like Burger King? Twitter says follow this advice

By

Twitter's director of information security is helping other users not suffer the same fate as Burger King and Jeep.

It's a wicked (internet) world

It's a wicked (internet) world

By

We need to consider all of the traditional facets of information security when we consider protecting information on the internet.

Windows bug, patched in April, continues to wreak havoc

By

A Windows vulnerability that Microsoft patched back in April continues to be used in targeted attacks against political, industrial and defense organizations.

Hackers breach Environment Protection Agency database

By

Thousands of U.S. Environmental Protection Agency employees had their personal information exposed through a database breach.

Needed: Better app control

Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

SC Congress Canada: "Social engineer back" employees

By

Social engineering isn't necessarily a bad thing if security professionals use it to their advantage, according to a speaker at SC Congress Canada.

Trojan designed to take screenshots of hotel payment apps

By

A new development in the criminal underground is to peddle trojans that steal credit card data from hotels.

Flight check-in emails lead to Zeus infection

By

Cyber criminals have cloaked spam to resemble US Airways check-in emails in phishing attempts that lead to Zeus trojan infections.

Security threats: Unwrapping 2011

Security threats: Unwrapping 2011

Multilayered protection starts with knowing what assets are most critical to your organization and implementing an in-depth security strategy.

Palin hacker appeal rejected

By

David Kernell, who hacked into Sarah Palin's email account, has lost an appeal against his obstruction of justice charge.

Boundless information: Mining social networks

Boundless information: Mining social networks

By

Criminals are finding social media websites like Facebook, which contain a vast array of personal assets, to be a treasure trove of information that they can use to launch further attacks.

US-CERT warns about spoofed US-CERT phishes

By

Phishers are spoofing email addresses belonging to US-CERT, an arm of the Department of Homeland Security that coordinates information sharing related to cyber threats, to trick users into installing malware.

U.S. Chamber of Commerce targeted in data heist

By

Hackers operating out of China are believed responsible for a major attack on the U.S. Chamber of Commerce in 2009 and 2010, but which was only revealed recently.

Fake FBI scam email making the rounds

By

A message purportedly sent from the FBI Anti-Terrorist and Monetary Crimes Division is making its way to inboxes, threatening recipients that they will be arrested if they do not reply back.

Duqu trojan spreads through 0-day Microsoft bug

By

A piece of malware that has drawn comparisons to the notorious Stuxnet worm is using an unknown Windows kernel vulnerability to infect its targets.

Reducing network breaches

Reducing network breaches

Consistent communication about the risk of social engineering is the first step in preventing network breaches, says Chris Harget, senior product marketing manager, ActivIdentity, part of HID Global.

Phishers aiming for Apple IDs, passwords

By

Spam that seemingly emanates from Apple is making the rounds with the aim of tricking users into handing over their IDs and passwords, researchers at anti-virus firm Trend Micro said in a blog post Monday.

Researcher finds way to send executable file on Facebook

By

Researchers have discovered a way to evade Facebook security controls to deliver a message that could come outfitted with a malicious attachment.

Report: RSA hackers knock off 760 other businesses

eBay, Motorola, IBM, McAfee and VMware were reportedly affected by same type of attack orchestrated against RSA.

Microsoft YouTube channel hacked

By

Hackers over the weekend accessed Microsoft's YouTube channel to swap out videos with their own. It is unclear what the intruders' motive was, but they may have been able to access the account by stealing its login credentials from a Microsoft employee, Graham Cluley, senior technology consultant at anti-virus firm Sophos, said in a blog post Sunday. One of the unauthorized videos posted was titled "Bingo" and featured an animated video game character shooting another character. By Monday morning, the channel was operating normally. The incident followed hackers last week taking over the Sesame Street YouTube channel to display pornographic videos.

Podcast: Automating social engineering

By

The process of delivering targeted attacks to end-users has gotten easier for attackers thanks to automated social engineering, in which adversaries can write tools that scour the web for personal data to include in their emails to increase their believability. The goal, of course, is to design messages that people are more likely to click on and, as a result, install malware on their machines or divulge personal information. In this podcast, Matias Brutti, a security consultant at security services firm IOActive, explains what the automation of social engineering means for organizations and how they can fight back.

Mac trojan spreads under guise of PDF document

By

Malware writers are borrowing a page from the Windows attack handbook with the latest Mac OS X threat.

Advanced persistent threats call for a reality check

Advanced persistent threats call for a reality check

Before seeking out help from vendors in dealing with the advanced persistent threat, security professionals must understand exactly what defines such an attack.

Researchers study actual file used in RSA SecurID breach

By

Researchers have discovered that the email containing the malicious file used to breach RSA contained just two sentences: "I forward this file to you for review. Please open and view it."

Cold call scams: Life in the old dog

It's a cold, cold-calling world: an old scam with some new wrinkles.

U.S. lead on huge phishing ring receives 13 years in prison

By

A Los Angeles man has earned considerable time behind bars after serving as the U.S. head of a phishing operation that stole more than $1 million from the customers of two banks.

New Zeus emails cloaked as Fed, IRS messages

By

Small and midsize organizations may want to take note: There is a particularly large Zeus spam campaign making the rounds.

Con artists pose as security companies in growing scam

By

Scareware has taken on a human face. Criminals posing as computer security engineers are having success in calling victims at home and stealing their money, according to a survey issued Thursday by Microsoft. Fifteen percent of 7,000 computer users polled in the United States, Canada, U.K. and Ireland said they have been been contacted by a phone scammer, and 22 percent of those were tricked into following the fraudsters' directions, which included giving them remote access to a computer or providing credit card information. Seventy-nine percent of those suffered a financial loss as a result. Victims were out an average $875 in the United States, the survey found.

Sign up to our newsletters

POLL