Spear Phishing

Spear phish uses Windows HLP files to skirt detection

By

An increase in spear phishing, where trojans are hidden inside Windows help files, is assisting attackers in stealing information from a variety of industries.

Spear phish cracks White House computer network

By

Government officials have yet to confirm the identity of the attackers, though Chinese hackers are being flagged as suspects.

Time-sensitive keywords prominent in phishing attacks

By

Successful phishing attacks in 2012 include words that allude to shipping and urgency, according to a new report.

New espionage campaign tied to RSA breach, GhostNet attacks

By

Dell SecureWorks researchers believe recent attacks targeting oil and energy companies in various countries are connected to cyber criminals behind RSA's breach and the GhostNet esionage campaign.

Video: Targeted Attacks

By

It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.

Mahdi developers pushing updates to the spy trojan

By

Discovered earlier this year, Mahdi isn't particularly sophisticated malware, but is effective due to redevelopment efforts by attackers. And now it's targeting people with connections to the United States.

Phishing emails targeting BlackBerry, iPhone users

By

Fraudsters are capitalizing on the trusted names of two major smartphone providers to spread malware.

Crooks using Zeus in new Facebook attacks

By

Variants of the Zeus trojan are being used in new Facebook and banking heists, security researchers and law enforcement are warning.

Phishing, the Slim Jim of cybercrime

Phishing is all grown up and operated on a large-scale by well-funded cybercriminals who use botnets to harvest personal data and sell it on the black market.

Reducing network breaches

Reducing network breaches

Consistent communication about the risk of social engineering is the first step in preventing network breaches, says Chris Harget, senior product marketing manager, ActivIdentity, part of HID Global.

Banker trade group warns of phishing uptick

By

Cybercriminals typically ramp up their phishing efforts during the holiday season and following natural disasters, according to the American Bankers Association.

Linking alms

I can't believe my own luck: Money and job offers are just pouring in.

Operation Shady Rat reveals vulnerability to cyber intrusion

By

A new McAfee report details a massive attack, ongoing for at least five years, that has targeted corporations, governments and even tiny nonprofits.

Crooks opt for spear phishing despite higher upfront cost

By

Cybercriminals are scrapping widespread malicious email campaigns for more targeted attacks, according to a new Cisco report.

Flash exploits might signal APT activity

By

An Adobe Flash vulnerability that was fixed this week is being leveraged in widespread but targeted drive-by downloads and spear phishing attacks.

IMF latest victim of "major" cyberattack, breach

By

The International Monetary Fund (IMF) has suffered a major cyberattack, the latest incident in a string of cyberattacks against high-profile organizations.

Fighting cybercrime

If you aren't fighting cybercrime in the workplace you are probably a victim.

Epsilon may have been tipped off that it was a target

By

The longtime partner of email marketing services provider Epsilon apparently warned the company last fall that it could be targeted by malware attacks.

Experts warn of attacks as more Epsilon victims emerge

By

Fallout continues, and new corporate victims come to light after the massive breach of an email marketing services provider.

Number of reported vulnerabilities spiked in 2010

By

System flaws and exploits dramatically jumped last year, but the news is not all bad, as many of the bugs were discovered by their creators.

Flash zero-day, social engineering enable RSA SecurID hack

By

The breach of RSA's intellectual property related to its SecurID products appears to be a classic case of social engineering and network pivoting.

Canadian ministries target of massive attack

By

Hackers using Chinese IP addresses entered government networks by spear phishing.

Cyberthreats: A long haul

By

Enterprises are under constant seige from cyberthreats that continue to evolve to new levels of sophistication, reports Deb Radcliff.

Sign up for our newsletters

POLL