Computer programmer Dani Grant revealed that short codes from AT&T are easy to spoof and expose customers to phishing scams. AT&T customers are exposed phishing attacks due to proprietary AT&T’s text protocols. Computer programmer Dani Grant discovered that is quite easy to spoof text messages from AT&T. In this variant of “Phishing” attacks, crooks attempt to trick victims […]
Security experts have collected evidence that cyber criminals are exploiting the incident of the flight QZ8501 for illicit activities. Cybercriminals are exploiting the tragedy of the AirAsia flight QZ8501 to conduct illicit activities. Every event that captures the attention of the media is an opportunity for the cyber criminals that could exploit it to run targeted […]
FireEye discovered that the Group of hackers dubbed APT3 that managed the Op Clandestine Fox is now running a new campaign dubbed Operation Double Tap. Researchers at FireEye have uncovered a new advanced persistent threat crew dubbed APT3, which is using exploits targeting recently disclosed vulnerabilities in Windows. The experts at FireEye believe that APT3 is the same […]
Latest report indicates that the alleged hack on Sony’s PlayStation Network, Windows Live and 2k games studio by Derp Tolling could be a hoax. News going round that Derp Trolling hacked Sony’s PlayStation Network(PSN), Microsoft’s Windows Live and 2k games studio freaked out millions of users, but now security experts says the alleged hack could […]
Trend Micro has published a new study on black cyber-markets focusing on product and services offered on the Brazilian underground. Trend Micro has published a new interesting report on the underground cyber-markets, this is a third study focused on the Brazilian cyber-underground offer, the previous ones analyzed Russian and Chinese marketplaces. The new study, exactly like […]
A study published by Google demonstrates that manual phishing attacks are the simplest and most effective method for hacking email accounts. A study recently published by Google demonstrates that so-called manual phishing attacks are the simplest and most effective method for hijacking users’ email address. Let’s consider that the manual phishing attacks, as suggested by the name, doesn’t use […]
Aussie spooks have warned of ‘real and persistent’ cyberattacks on participants of the upcoming G20 conference in Brisbane. World leaders have been advised to man their devices closely while the Australian public is on a code red alert for an eminent threat. Months after alleged Russian government backed hackers’ targeted NATO computers and European Governments […]
Security experts at AppRiver firm uncovered Malicious Amazon phishing emails that aim to infect Holiday Shoppers in the U.S. and U.K. Researchers at AppRiver firm reported that cyber criminals are targeting holiday shoppers at Amazon UK with large a scale phishing campaign, which is spreading malicious emails. The emails sent by crooks include malicious Microsoft Word documents […]
Security experts at TrendMicro have discovered a new Phishing technique dubbed Operation Huyao that it very hard to detect by site owners and end-users. Security experts have uncovered a new phishing technique, dubbed Operation Huyao, targeting online shopping websites and that is considered by researchers a significantly change to the threat landscape for phishing activities. In a classic […]
Google has announced the introduction of an improved two-factor authentication mechanism based on a USB token dubbed Security Key. Google firm considers cyber security a pillar of its business, the last initiative announced by the company is the introduction of an improved two-factor authentication system for its services, including Gmail. The new 2FA process is based on the use of a […]