Category Archives: phishing

All they need is a click!

Clickbait malware sites “You No Longer Need To Be A Member To Shop In Their Stores” (1) “NASA Confirms Earth Will Experience 15 Days of Complete Darkness in November” (2) “First she did this, and then you won’t believe what happened!” If you visit any social media, news sites, or see advertisements online, you will…

The Race for Security: Zero Day Exploits

Our networked systems, be they computers, databases, phones, or other devices, are an endless battlefield. Zero-day exploits have been buzzing in the news in the wake of the Wikileaks concerns, where a number of such exploits had been posted where any who were interested could learn illegally about how to use them. Many are worried about…

The Tax Clock is Ticking

Phishing Scams Thrive on Deadlines and Fear Tax returns are soon due on Tuesday, April 18th, 2017, and with that looming deadline, the pressure is on to have everything done and filed correctly. All paperwork in order? All taxes accounted for? Employees all have their W-2s? It is a pressure that phishing scammers thrive upon….

JP Morgan security breach affects 76 million homes, 7 million businesses

JP Morgan Chase confirmed that the information from 76 million households and 7 million businesses was compromised after a cyberattack over the summer.

The largest bank in the US first announced the massive attack back in July, but only exposed the scale of the attack Thursday in an 8-K filing with the Securities and Exchange Commission.

Syrian Electronic Army hijacks eBay and PayPal

Famed ‘hacktivist’ group Syrian Electronic Army claims to have hacked eBay and PayPal Saturday. Visitors of the eBay and PayPal UK websites were redirected to defacement pages, but the group said the point of the DNS hack was not to steal users’ information.

Defense against APTs: technology plus education

Malware, hacking, and other techniques are commonly used by cyber criminals in order to steal data from targeted companies.

Phishing, or trying to obtain usernames, passwords, or other sensitive information by impersonating a trustworthy entity, is part of 95 percent of all state-affiliated espionage attacks, according to Verizon’s 2013 Data Breach Investigations Report. The organization reviewed 47,000 reported security incidents from the year 2012.

Spear Phishing an old tactic using new distribution?

Phishing using data URI’s embedded in websites distributed using URL shortening services.