phishing

Pierluigi Paganini May 23, 2015
eBay promptly fixed a reflected file download vulnerability

EBay has recently fixed a reflected file download vulnerability discovered by the security researcher David Sopas at WebSegura. Ebay is among the web services most targeted by cyber criminals and phishers, over the years, security experts have spotted an impressive amount of attack exploiting techniques more or less sophisticated. Almost every attack relies on social engineering, attackers […]

Pierluigi Paganini May 19, 2015
A severe URL Spoofing flaw affects the Apple Safari Browser

A URL Spoofing flaw affects the Apple Safari browser. It could trick users into visiting malicious websites despite they are accessing to legitimate URLs. A serious security vulnerability affects the Apple Safari browser, the flaw could be exploited by attackers to trick Safari users into visiting malicious websites while are trying to surf on legitimate websites. […]

Pierluigi Paganini May 18, 2015
New Intel Security study shows that 97% of people can’t identify phishing emails

Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect phishing emails. For this study, Intel Security presented 10 emails where people were asked to identify which emails were phishing with the purpose of steal personal data, and which were legit, legal emails. The data for the […]

Pierluigi Paganini May 14, 2015
Hackers drain money from Starbucks accounts linked to users’ credit cards

Hackers steal money from Starbucks mobile customers using linked credit cards, nearly 16 million customers who use the company app are at risk. Starbucks is the last victim of scammers, cyber criminals are syphoning money from the credit or debit card linked to the customers’ Starbucks accounts. The attack is quite simple for fraudsters, the criminal […]

Pierluigi Paganini May 05, 2015
Law enforcement warns of Nepal Earthquake Scams

FBI and security researchers have uncovered fraudulent activity pertaining to relief efforts associated with the tragic Nepal earthquake. Cyber criminals have no scruples, they are always ready to exploit any tragedy to maximize their profits exploiting the interest of people in disastrous events. The last tragedy in order of time is the earthquake that hit […]

Pierluigi Paganini May 02, 2015
New Google Password Alert extension already hacked

A few hours after the presentation of the Google Password Alert extension a researcher already have developed two methods to bypass it. A few hours ago, Google released the Password Alert extension that was designed to warn users when they are submitting their Google credentials to fraudulent websites. “Here’s how it works for consumer accounts. Once you’ve […]

Pierluigi Paganini April 27, 2015
Russian Hackers accessed President Barack Obama emails

The Time revealed that Russian hackers have accessed President Barack Obama emails in the attack on the White House’s unclassified computer system. Earlier this month, US officials admitted there was a cyber “event” late last year, but refused to confirm reports Russia was behind the attack. New revelations on the attack against the unclassified network […]

Pierluigi Paganini April 10, 2015
Compliance: An Often Overlooked, Powerful Method of Threat Prevention

Which are different components that must be taken into consideration  to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must face in today’s world is the task of securing their organization’s assets.  While physical security is a huge component in ensuring that the residual risk level existing […]

Pierluigi Paganini April 09, 2015
AlienSpy RAT exploited to deliver the popular Citadel Trojan

Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]

Pierluigi Paganini April 08, 2015
How Russians hackers breached the White House unclassified network

According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]