social engineering

  • Companies, governments brace for a second round of cyberattacks in WannaCry’s wake

    Companies, governments brace for a second round of cyberattacks in WannaCry’s wake

    As the world readies to open for business on Monday, companies and governments are bracing for a second round of cyberattacks in the aftermath of Friday’s WannaCry hack. Indeed, security experts are already warning that a new version of WannaCry has emerged over the weekend that doesn’t have the kill switch protocol that stopped the initial version of the cyberattack late on… Read More

  • Ransomware completely shuts down Ohio town government

    Ransomware completely shuts down Ohio town government

    In another interesting example of what happens when you don’t manage your backups correctly, the Licking County government offices, including the police force, have been shut down by ransomware. Although details are sparse, it’s clear that someone in the office caught a bug in a phishing scam or by downloading it and now their servers are locked up. Wrote Kent Mallett of the… Read More

  • Russian hacking team The Dukes targeting NGOs and think tanks after Trump victory

    Russian hacking team The Dukes targeting NGOs and think tanks after Trump victory

    According to Internet security team Volexity has detected an active spear-phishing effort by Russian hacker groups including Cozy Bear and the Dukes. The targeted phishing emails feature subject lines like “The “Shocking” Truth About Election Rigging” and a false “FYI” from the Clinton Foundation. You can read about the efforts on Volexity’s own site… Read More

  • Researchers sabotage 3D printer files to destroy a drone

    Researchers sabotage 3D printer files to destroy a drone

    Researchers at Ben-Gurion University of the Negev (BGU), the University of South Alabama, and Singapore University of Technology and Design have successfully injected malicious code into a computer which, in turn, added invisible commands to a file containing a 3D model of a drone propeller. When they printed the model and attached it to the drone, the propeller broke upon take-off. This… Read More

  • How data thieves hook victims — and how to beat them Crunch Network

    How data thieves hook victims — and how to beat them

    Say what you will about the thieves who ply their trade in the digital realm, you can’t deny they put in a hard day’s work. After all, according to Verizon’s just-released 2016 Data Breach Investigations Report, which analyzed an astounding 100,000 digital security incidents last year, these crooks continue to succeed at stealing corporate and personal data and records by… Read More

  • Want To Hook Your Users? Drive Them Crazy.

    Want To Hook Your Users? Drive Them Crazy.

    In advertising, marketers reinforce a behavior by linking to the promise of reward. “Use our product,” they claim, “and you’ll get laid”; it’s the gist of many product pitches from soap to hamburgers. But online, feedback loops aren’t cutting it. Users are increasingly inundated with distractions, and companies find they need to hook users quickly if… Read More