Intel Security published an a curious study to test consumer knowledge about phishing practice and measure the ability to detect phishing emails. For this study, Intel Security presented 10 emails where people were asked to identify which emails were phishing with the purpose of steal personal data, and which were legit, legal emails. The data for the […]
Hackers steal money from Starbucks mobile customers using linked credit cards, nearly 16 million customers who use the company app are at risk. Starbucks is the last victim of scammers, cyber criminals are syphoning money from the credit or debit card linked to the customers’ Starbucks accounts. The attack is quite simple for fraudsters, the criminal […]
FBI and security researchers have uncovered fraudulent activity pertaining to relief efforts associated with the tragic Nepal earthquake. Cyber criminals have no scruples, they are always ready to exploit any tragedy to maximize their profits exploiting the interest of people in disastrous events. The last tragedy in order of time is the earthquake that hit […]
A few hours after the presentation of the Google Password Alert extension a researcher already have developed two methods to bypass it. A few hours ago, Google released the Password Alert extension that was designed to warn users when they are submitting their Google credentials to fraudulent websites. “Here’s how it works for consumer accounts. Once you’ve […]
The Time revealed that Russian hackers have accessed President Barack Obama emails in the attack on the White House’s unclassified computer system. Earlier this month, US officials admitted there was a cyber “event” late last year, but refused to confirm reports Russia was behind the attack. New revelations on the attack against the unclassified network […]
Which are different components that must be taken into consideration to build an efficient information security foundation and prevent cyber threats. Introduction A major obstacle that management must face in today’s world is the task of securing their organization’s assets. While physical security is a huge component in ensuring that the residual risk level existing […]
Security experts at Fidelis firm discovered that variants of the AlienSpy remote access trojan (RAT) are currently being used in global phishing campaigns. Cyber criminals have exploited the AlienSpy RAT to deliver the popular Citadel banking Trojan and maintain the persistence inside the targeted architecture with a backdoor mechanism. Criminal crews used AlienSpy RAT to compromise systems in […]
According to the CNN Russian hackers used data gathered from State Department to run a Phishing campaign against White House staffers. On October 2014, the Reuters Agency published the news that a suspicious activity had been detected on the Executive Office of the President (EOP) network. According to an unnamed official at the White House, hackers infiltrated an […]
A new phishing scam is targeting Yahoo users worldwide, this campaign could be ineffective if we share awareness about bad actors’ TTPs. A new large-scale scam is trying to deceive Yahoo users that are receiving a phishing email that asks for “Yahoo Account Confirmation.” The phishing email claims to be sent by Yahoo, it requests […]
British Airways Executive Club member accounts were hacked, it isn’t a data breach but hackers used credentials available in the underground. The popular security expert Graham Cluley reported that Members of British Airways Executive Club are noticing suspicious activities for their accounts. The Members of British Airways Executive Club observed that their accounts were mysteriously emptied of […]