Nearly 90 percent of global organizations were targeted with BEC and spear phishing attacks in 2019, reflecting cybercriminals’ continued focus on compromising individual end users, a Proofpoint survey reveals. For the full report and a must read : Help Net Security
Category: Security Blog
Post about current security notices etc.
There are breaches, and there are megabreaches, and there’s Equifax. But a newly revealed trove of leaked data tops them all for sheer volume: 772,904,991 unique email addresses, over 21 million unique passwords, all recently posted to a hacking forum. Full story from Wired™ To protect yourself as much as possible set a routine for…
More than 86% of the world’s iPhones can still be hacked with just a text. At the Black Hat security conference in Las Vegas on Wednesday, Google Project Zero researcher Natalie Silvanovich is presenting multiple so-called “interaction-less” bugs in Apple’s iOS iMessage client that could be exploited to gain control of a user’s device.…
The late 1990s was a simpler time for Google. The nascent company was merely a search engine, and Gmail, Android and YouTube were but glimmers in the startup’s eye. Google’s first privacy policy reflected that simplicity. It was short and earnest, a quaint artifact of a different time in Silicon Valley, when Google offered 600…
The web is distributed, but it’s also interconnected. It needs to be so that data can move around worldwide without all being controlled by a single entity. So every time you load a website or send an email, BGP is the system responsible for optimizing the route that data takes across these sprawling, intertwined networks.…
A typical phishing email impersonates a well-known contact or trusted company to induce the recipient to click on an embedded link, with the ultimate goal of credential or credit card harvesting. During Q1 2019, FireEye saw these type of attacks increase by 17% over the prior quarter. The top spoofed brands across these activities included…
Quick Heal published a blog post analysing various targeted emails being used to deliver a remote access Trojan to victims. Specifically utilising Excel file attachment. Learn more here.
On Thursday, researchers from threat intelligence firm Mimecast are disclosing findings that an Excel feature called Power Query can be manipulated to facilitate established Office 365 system attacks. Read the full Wired article here.
IBM X-Force reports: BleepingComputer published an article on a new phishing scam attempting to trick users into providing their Outlook Web App credentials. The body of the email claims that there are various messages that require user approval before delivering. Each email entry is accompanied by a link to release, whitelist, or deny the associated…
Take a step back and think about the trail of data you leave behind in our digital world. Full story from Wired.