Cybercriminals in the phishing business have adopted a new phishing method to obfuscate the source code for the forged page by using a custom web font to implement a substitution cipher that looks like plain text. When browsers render the phishing page, what users see is the fake landing page created to steal login credentials,...Continue Reading
Cyber Attackers have just discovered new ways to invade and breach corporate email accounts, which has resulted in a US$12-Billion cost to businesses over the last 3-5 years, according to Digital Shadows. Compromised corporate email accounts are commonly traded on the dark web, where criminals can earn a pretty penny, particularly if the email...Continue Reading
The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload...Continue Reading
As we all know, online travel booking sites provides many advantages to travelers. It offers hassle-free management of bookings as it works 24/7, faster payment transaction, and less phone time. But nowadays where internet phishing is becoming more popular when it comes to online attacks, one should be very careful in choosing the best online...Continue Reading
The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns. A similar trick is used in the new version,...Continue Reading
With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common. Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages. In this hack, users, when redirected, are taken...Continue Reading
Scammers are abusing the Google Calendar feature using a sophisticated phishing scams to steal data of 1.5 billion users of Google Calendar, including Gmail users.It was observed recently that there were multiple cases of a sophisticated phishing scams targeting consumers through unsolicited Google Calendar notifications with the purpose of tricking users into sharing their personal...Continue Reading
Phishing attacks have now progressed toward becoming something of a day by day event for some. However, the motivation behind why these noxious attacks stay abundant lies in their resourcefulness. In time, we know about a clever phishing method that includes technical support as well. We are talking about an Office 365 phishing campaign that...Continue Reading
Another phishing campaign called ” Beyond the Grave” targeted international hedge funds on January 9th, 2019. In an announcement presented on Bleeping Computer, the attackers have expressed that they will keep on targeting banking and financial institutions in the future. A part named Xander Bauer has made a post in the Bleeping Computer forums with...Continue Reading
Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth. In any case, the social insurance association asserts that no therapeutic data...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.