phishing

FakeInst – Kaspersky discovered the first active Android SMS trojan

Kaspersky Lab has recently detected FakeInst, the first active SMS trojan for Android which targeted users in 66 countries, including…

12 years ago

APWG report 2H2013- Analysis of phishing phenomena on global scale

The APWG report 2H2013 seeks to understand trends and their significance by quantifying the scope of the global phishing problem.…

12 years ago

Reading the Mandiant M-Trends 2014 Threat Report

Mandiant has released its annual M-Trends 2014 Threat Report, a document that analyzes actors, means and motivations behind attacks observed…

12 years ago

Symantec on a fake voting campaign used to steal Facebook credentials

Security experts at Symantec observed a new phishing campaign based on a fake voting application used to steal victim's credentials.…

12 years ago

Security threat landscape in the Middle East … the mined cyber area

Analysis of the cyber threat landscape in the Middle East region provided by Tim Rains, director of Trustworthy Computing at…

12 years ago

Netcraft stats on the increasing abuse for WordPress installations

More than 12,000 phishing sites analyzed by Netcraft are hosted on compromised WordPress installations, the websites were used also to…

12 years ago

A sophisticated phishing scheme is targeting Google Docs Users

Security Researchers at Symantec detected a new Sophisticated Phishing Scam that is targeting the Google Docs Users with complex social…

12 years ago

Facebook ‘Naked Video’ scam hits 2 million users

Security Experts at Bitdefender discovered a clickjacking Naked Video scam that already infected more that 2 millions Facebook users. Sex…

12 years ago

Trend Micro report on Chinese Mobile Underground Market

This report provides a brief overview of some basic underground activities in the mobile space in China, describing products and…

12 years ago

Soghoian on government surveillance through service update process

Chris Soghoian, principal technologist with the American Civil Liberties Union, explained that government surveillance could exploit service update process. Chris…

12 years ago

This website uses cookies.