phishing

  • This phishing technique is more interesting than dangerous

    This phishing technique is more interesting than dangerous

    There’s no shortage of ways adversaries will employ to get you to click through to a malicious website, some technical, some psychological. This one is interesting because it leverages a useful feature of browsers that you might have never thought about. Read More

  • Private pictures and video of Emma Watson and other celebrities leak online

    Private pictures and video of Emma Watson and other celebrities leak online

    Photos apparently stolen from Emma Watson, Amanda Seyfried and other female celebrities have been posted on 4Chan and Reddit, drawing comparisons to a 2014 hack, grossly dubbed “The Fappening” that exposed nude photos and video of several celebrities. Read More

  • Researchers simulate a ransomware attack on industrial controls

    Researchers simulate a ransomware attack on industrial controls

    Researchers at the Georgia Institute of Technology have created a form of ransomware that can hit us where it really counts: the water supply. Their program installed itself in a model water plant and allowed the researchers to change chlorine levels, shut down water valves, and send false readings to monitoring systems. “We are expecting ransomware to go one step farther, beyond the… Read More

  • Ransomware completely shuts down Ohio town government

    Ransomware completely shuts down Ohio town government

    In another interesting example of what happens when you don’t manage your backups correctly, the Licking County government offices, including the police force, have been shut down by ransomware. Although details are sparse, it’s clear that someone in the office caught a bug in a phishing scam or by downloading it and now their servers are locked up. Wrote Kent Mallett of the… Read More

  • Russian hacking team The Dukes targeting NGOs and think tanks after Trump victory

    Russian hacking team The Dukes targeting NGOs and think tanks after Trump victory

    According to Internet security team Volexity has detected an active spear-phishing effort by Russian hacker groups including Cozy Bear and the Dukes. The targeted phishing emails feature subject lines like “The “Shocking” Truth About Election Rigging” and a false “FYI” from the Clinton Foundation. You can read about the efforts on Volexity’s own site… Read More

  • The ransomware dilemma Crunch Network

    The ransomware dilemma

    More than 90 percent of all phishing emails are now ransomware. The average amount paid via ransomware has grown from $40 in 2009 to $1,000 in 2016. This amount will grow even faster as ransomware moves to enterprise. Read More

  • Researchers sabotage 3D printer files to destroy a drone

    Researchers sabotage 3D printer files to destroy a drone

    Researchers at Ben-Gurion University of the Negev (BGU), the University of South Alabama, and Singapore University of Technology and Design have successfully injected malicious code into a computer which, in turn, added invisible commands to a file containing a 3D model of a drone propeller. When they printed the model and attached it to the drone, the propeller broke upon take-off. This… Read More

  • Are banks promoting phishing? Crunch Network

    Are banks promoting phishing?

    I’ve recently seen a few examples of services that ask customers to type in their online banking usernames and passwords so the service can access their bank accounts on their behalf. The applications are fairly broad and definitely useful — making payments, ID verification and analyzing data, for example. This is a security anti-pattern. This is bad news. Read More

  • How data thieves hook victims — and how to beat them Crunch Network

    How data thieves hook victims — and how to beat them

    Say what you will about the thieves who ply their trade in the digital realm, you can’t deny they put in a hard day’s work. After all, according to Verizon’s just-released 2016 Data Breach Investigations Report, which analyzed an astounding 100,000 digital security incidents last year, these crooks continue to succeed at stealing corporate and personal data and records by… Read More