Blog Posts Tagged with "scams"
False Flag Phishing
November 15, 2012 Added by:Alan Woodward
There is a form of phishing becoming more common on Twitter that is likely to fool even the most suspicious of users. I very nearly fell for it myself. What stopped me? Unlike me, the person who purportedly sent me the message doesn’t make the sort of spelling mistakes that were in the message...
Comments (0)
Skimming, Identity Theft and How Online Business Defends Against Cybercrime
October 25, 2012 Added by:Robert Siciliano
Over the past 5 years a scam known as electronic funds transfers at the point of sale (EFTPOS) or skimming has been prevalent. Consumers commonly swipe both credit and debit cards through the in-store machines to pay for goods and services and hackers have been adept at coming up with ways to skim those cards...
Comments (0)
Cyberheists: Biggest Threat Facing American Businesses
August 28, 2012 Added by:Ben Rothke
It is no myth that there is plenty of money and digital assets on networks worldwide. Those that want to secure those assets need to safeguard them. This book is written specifically for smaller to medium size businesses that often lack the staff and budget necessary to ensure effective information security...
Comments (0)
Misinformation and Manipulation in the Age of Social Media
August 21, 2012 Added by:Ben Rothke
Terms such as revolutionary, and groundbreaking are often used in reference to the web and social media. The web and social media have also been so for scammers, thieves, liars, manipulators, and the like who use social media in a big way. To avoid being caught in their lair, it is imperative to know the risks...
Comments (1)
FBI and IC3 Issue Advisory on Revetion Ransomware
August 10, 2012 Added by:Headlines
Reveton is drive-by malware and unlike many viruses which activate when users open a file or attachment. Reveton can install itself when users simply click on a compromised website. Once infected, the computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law...
Comments (0)
Student Pleads Guilty to Counterfeiting Coupons on the Internet
August 07, 2012 Added by:Headlines
In addition to creating and disseminating fake coupons, Henderson also wrote tutorials and created templates he posted online and that provided instructions for creating counterfeit coupons using their own computers. Henderson’s scheme caused retailers and manufacturers to lose approximately $900,000....
Comments (1)
Cyber Criminals Prey on Worried Parents
August 02, 2012 Added by:Theresa Payton
Cyberthieves are trolling the internet for information and with a convincing phone call trying to trick parents out of thousands of dollars. It sounds like this scam would be easy to spot but it’s so scary, so emotional, and happens so often even Western Union employees are trained to ask questions...
Comments (0)
DHS: Cybersecurity Awareness and the Summer Olympics
July 19, 2012 Added by:Infosec Island Admin
Hackers frequently take advantage of highly-publicized events and popular news to get users to click on fraudulent links and unknowingly download malware onto their computers, smart phones, tablets, and other wireless devices. To avoid these online scams, it's important to follow these practices...
Comments (0)
Alert: Fake FBI Emails Seek Personal Information
June 26, 2012 Added by:Headlines
The fraudulent e-mails give the appearance of legitimacy due to the use of pictures of the FBI Director, seal, letterhead, and/or banners. The schemes cover a range from threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams...
Comments (0)
Request for Information: Social Engineering Using Social Media
June 25, 2012 Added by:Joel Harding
We’ve been saying for years that the human element is the weakest link in cybersecurity. Kevin Mitnick (out of prison now and doing well) was an extremely talented hacker but what set him apart was his research into potential victims and then having the audacity to social engineer them...
Comments (1)
Cyber Criminals Hiding Behind Travel Emails
June 17, 2012 Added by:Theresa Payton
Cyber criminals love to be where the action is, and they know this is a peak travel season, so they have found the perfect hiding place: Travel confirmations. They realize that more people are booking travel online and receiving their travel confirmations via email...
Comments (0)
Mobiles and Phishing – Why They're More Dangerous
June 14, 2012 Added by:Robert Siciliano
SMiShing is a version of phishing in which scammers send text messages. The best protection from this scam is awareness. Once you understand how it works, you are better positioned to recognize mobile phishing, and how to avoid clicking links within emails or text messages and otherwise responding to such ruses...
Comments (0)
What Are the Risks of Mobile Spam?
June 05, 2012 Added by:Robert Siciliano
While spam is mostly annoying, it can also pose some risks. You could even be tricked into paying for products and services that turn out to be illegitimate or nonexistent. Spam can also be used to distribute Trojans, spyware, and exploit code that can infect your mobile device or steal your information...
Comments (2)
Social Media Seeks Control Through TOS Enforcement
May 21, 2012 Added by:David Navetta
So far, social media companies have only sought to squash undesirable behavior on their platforms from third party commercial entities, such as spammers or those seeking password sharing, but in the future such litigation could be viable against individual users...
Comments (0)
It's Summer Blockbuster Season Again - Time to get Prepared
May 08, 2012 Added by:Lee Munson
One of the most used tricks that black hat hackers use during this time of year is to piggyback off of the advertising of big budget movies. There are a lot of ways that you can leverage attacks with this type of advertising and believe me they use all of them...
Comments (0)
On the Underground Economy of Twitter Followers
May 06, 2012 Added by:Gianluca Stringhini
All Twitter Account Markets we analyzed offer both "free" and "premium" versions. While premium clients pay for their services, the free ones gain followers by giving away their Twitter credentials - a clever way of phishing - or by sending out "promoted" content, typically spam...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider