Category

Phishing
save the children fraud prevention malware phishing identity theft cyber criminal attacked charity
Scammers and cyber criminals attacked kid’s charity – Save the Children Federation, a well-known U.S. charity, into sending them approximately one million dollars. The attacker managed to access an employee’s email account and from there sent fake invoices and other documents designed to trick the organization into sending the money. Whatever online website scanners or...
Continue Reading
uc browser ucweb phishing phishingattacks
An address bar vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by a cyber-security researcher, which allows an attacker to pose his phishing domain as the targeted site.   According to the researcher, the UC Browser phishing vulnerability exists only...
Continue Reading
corporate email hacking data breach databreach
Cyber Attackers have just discovered new ways to invade and breach corporate email accounts, which has resulted in a US$12-Billion cost to businesses over the last 3-5 years, according to Digital Shadows.   Compromised corporate email accounts are commonly traded on the dark web, where criminals can earn a pretty penny, particularly if the email...
Continue Reading
babyshark baby shark malware phishing cryptocurrency
Last February 2019, Security researchers identified several spear phishing emails sent in November 2018 containing new malware that shares infrastructure with playbooks associated with North Korean campaigns. The spear phishing emails were written to appear as though they were sent from a nuclear security expert who currently works as a consultant for in the U.S....
Continue Reading
safari browser spoofing phishing
A cyber-security researcher based in Pakistan has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari Browser for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still unpatched, potentially leaving...
Continue Reading
phishing attack android mobile hacking malware mobile app
Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server.  ...
Continue Reading
instagram records social media compromised data
Huge amount of Instagram records has been exposed by Anurag sen a security researcher. Instagram was so far clueless on how this unsecured profile ended up online. The Instagram data included user bios, profile pictures, followers’ numbers and location. This information is viewable online. According to online tech publishing firm, which incidentally, broke the story....
Continue Reading
game of thrones got phishing malware antiphishing antimalware
The popular series’ – Game of Thrones’ – fans have been eagerly awaiting the weekly episodes of this wildly popular series in its final season. With this anticipation and enthusiasm for the show, comes an opportunity for phishing scam and hacker attacks.   This week, security researchers from well-known firms cited Game of Thrones as...
Continue Reading
bank payroll phishing
Scams targeting tax professionals in phishing scam emails involving payroll direct deposit and wire transfer have been on the increase, warns the Internal Revenue Service. The IRS and its Security Summit partners report that these business email compromise/business email spoofing (BEC/BES) tactics generally target all types of industries and employers, but recently the service has...
Continue Reading
socialmedia impersonation phishing
The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload...
Continue Reading
1 2 3 17