phishing

  • Researchers sabotage 3D printer files to destroy a drone

    Researchers sabotage 3D printer files to destroy a drone

    Researchers at Ben-Gurion University of the Negev (BGU), the University of South Alabama, and Singapore University of Technology and Design have successfully injected malicious code into a computer which, in turn, added invisible commands to a file containing a 3D model of a drone propeller. When they printed the model and attached it to the drone, the propeller broke upon take-off. This… Read More

  • Are banks promoting phishing? Crunch Network

    Are banks promoting phishing?

    I’ve recently seen a few examples of services that ask customers to type in their online banking usernames and passwords so the service can access their bank accounts on their behalf. The applications are fairly broad and definitely useful — making payments, ID verification and analyzing data, for example. This is a security anti-pattern. This is bad news. Read More

  • How data thieves hook victims — and how to beat them Crunch Network

    How data thieves hook victims — and how to beat them

    Say what you will about the thieves who ply their trade in the digital realm, you can’t deny they put in a hard day’s work. After all, according to Verizon’s just-released 2016 Data Breach Investigations Report, which analyzed an astounding 100,000 digital security incidents last year, these crooks continue to succeed at stealing corporate and personal data and records by… Read More

  • Top sports websites unleash foul play in the enterprise Crunch Network

    Top sports websites unleash foul play in the enterprise

    The reality is that merely checking a March Madness bracket puts not only the employee at risk, but also the entire enterprise. Read More

  • GreatHorn raises $2.25 million for its young cloud security platform

    GreatHorn raises $2.25 million for its young cloud security platform

    GreatHorn, a cloud security platform focused on stopping phishing attacks, has raised $2.25 million in seed funding led by ff Venture Capital and SoftTech VC, with participation from Techstars Ventures, RRE Ventures, Zelkova Ventures, V1.VC and investor Walter Winshall. The Belmont, Ma.-based company came together last year, as a kind of bet that CEO Kevin O’Brien and his cofounder… Read More

  • Prosecutors find that ‘Fappening’ celebrity nudes leak was not Apple’s fault

    Prosecutors find that ‘Fappening’ celebrity nudes leak was not Apple’s fault

    Hacker Ryan Collins pleaded guilty to stealing a number of nude photos — including images of Jennifer Lawrence — from Apple’s servers, after getting snared by the FBI. In the process of the trial, it became clear that the hack didn’t involve Apple’s services being compromised through brute-forcing or password cracking, but rather that they were the result of… Read More

  • Six Lessons From Cybersecurity Superhero Training Crunch Network

    Six Lessons From Cybersecurity Superhero Training

    One of my distinct grade-school memories is filing out of fourth grade class, nervous, but excited to miss a portion of math class. We were having our quarterly disaster-survival drill; instructing students on what to do in case disaster strikes. While working through yet another attempted malicious cybersecurity attack it dawned on me, why can’t we apply this diligence and training… Read More

  • APIs Are The New FTEs Crunch Network

    APIs Are The New FTEs

    Facebook, Google and Twitter have to deal with outrageous amounts of spam and abuse. They hire teams of engineers to stop trolls, outwit bad actors and otherwise keep their walled gardens free of misanthropes. It’s a costly business. Huge teams of Full-Time Employees, or FTEs, are charged with stopping these attacks at other companies, and it’s easy to imagine millions of dollars… Read More

  • Regular Facebook Users Are More Likely To Fall For Phishing Scams

    Regular Facebook Users Are More Likely To Fall For Phishing Scams

    Researchers at SUNY Buffalo have found that habitual Facebook users — those who are on the site more frequently than their peers — were more susceptible to phishing scams. How did they figure this out? By asking them about their habits and then surreptitiously creating a fake friend who then asked them for private information, including their student ID number and date of birth. Read More

  • With New Business Suite & Samsung Partnership, Mobile Security Company Lookout Prepares To Take On The Enterprise

    With New Business Suite & Samsung Partnership, Mobile Security Company Lookout Prepares To Take On The Enterprise

    Lookout, a mobile security company which previously focused on consumer protections and anti-malware services, is today taking a step to expand its footprint further with the launch of a new, standalone product for business. Arriving later this year, Lookout for Business intends to allow larger organizations the ability to secure mobile devices attaching to the network – like the… Read More

  • Java Applet Attack Wipes Out Bitcoin Accounts On Mt. Gox

    Java Applet Attack Wipes Out Bitcoin Accounts On Mt. Gox

    The price of freedom, as they say, is eternal vigilance. A user called bitbully on the Bitcointalk Forums found himself 34 bitcoins poorer when he visited a site claiming to be a chat service connected with Mt. Gox, a popular bitcoin trading service. The site, wwwdotmtg(this is an o)x-ch(this is an a)tdotinfo (do not visit this site), apparently places a cross-site transfer order on the… Read More