Social engineering is an increasingly important methodology used by fraud actors of all types to gather information and target government agencies, SMBs and enterprises – in addition to consumers. In this post, I’d like to share my strong point of view…Continue Reading
via www.infosecurity-magazine.com BlackBerry Acquires Cylance for $1.4bnThe CEOs of BlackBerry and Cylance held a media conference this morning after announcing news of an acquisition. BlackBerry announced that it has finalized an agreement in which it…Continue Reading
From the tale of the Trojan horse to Victor Lustig, the infamous Austria-Hungarian who convinced a number of scrap metal dealers that he was selling the Eiffel Tower, scams like these are about as old as human history. But social engineering scams are …Continue Reading
Researchers at Proofpoint warns that the threat actor TA505 have been using a new Remote Access Trojan (RAT) dubbed tRat that implements a modular structure that was written in Delphi.
The TA505 operates on a large scale, it was behind other major cam…Continue Reading
“It is increasingly common for threat actors to include security brands as part of their social engineering. Stating that a document is “protected” by a security vendor plays into their ability to trick recipients into enabling macros that ultimately i…Continue Reading
Organisations are warned all the time about the threat of cyber attacks, but what does that really mean? How might a crook actually inflict damage? Here are seven of the most common methods of attack.
The term ‘hacker’ is often used synonymously with …Continue Reading
via www.infosecurity-magazine.com One Million Kids Tracker Watches Deemed UnsafeSecurity researchers are urging parents to think twice about buying GPS-enabled smart watches to keep their children safe, after revealing that scores of models are riddled…Continue Reading
For a fifth year now, Europol has developed the IOCTA (Internet Organized Crime Threat Assessment). The primary objective of the assessment is the provision of a comprehensive type of overview of the current and anticipated threats in the future, as we…Continue Reading
Today, media and entertainment companies in particular face numerous security threats. These span their internal enterprise software applications and hardware, physical office locations, service delivery infrastructure, content protection methods, bill…Continue Reading
Phishing is fast becoming malware’s favorite vector, proving to be incredibly pervasive with 76 percent of businesses having reported to being a victim of a phishing attack in the last year. The scams are all-encompassing. Numerous instances, like the …Continue Reading