Blog Posts Tagged with "spear-phishing"

69dafe8b58066478aea48f3d0f384820

Email Authentication Rates Rise in 2011

October 05, 2011 Added by:Headlines

“The increased incidents of spear phishing targeting consumers, business and government users have accelerated the business value of email authentication. Organizations who fail to adopt are putting their employees, data and consumers at an unacceptable level of risk..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spear-Phishing Operation Targets Senior US Officials

August 16, 2011 Added by:Headlines

"Victims get a message from an address of a close associate or a collaborating organization/agency, which is spoofed. The message is crafted to look like a subscription form offering to enter Gmail credentials to activate it..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Spear Phishing Leaves a Bloody Wound

July 19, 2011 Added by:Robert Siciliano

Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

This Article Has Been Has Been Re-Hashed Re-Hashed

June 14, 2011 Added by:J. Oquendo

Targeted phishing, aka spearfishing attacks, have been noticed since 9/11 and no one seems to have gotten their act together to defend against this attack. The attack itself is almost always defendable with, and I have stated this over and over again, Extrusion Prevention...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Chinese Hackers Spear-Phishing for US Military Secrets

April 23, 2011 Added by:Dan Dieterle

What could the Chinese hope to gain? Military secrets. Along with terabytes of data that have been stolen, the Chinese also obtained login credentials and blue prints to some of America’s hi-tech military equipment...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

Spear-Phishing Season Is Declared Open

April 08, 2011 Added by:PCI Guru

Post-Epsilon breach, it seems every merchant under the sun is notifying their customers of the expected onslaught of electronic mail messages asking for bank account and credit card numbers among other PII. As a result, a lot of credit card numbers will likely get exposed. Be prepared...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Top Five Online Scams

March 16, 2011 Added by:Robert Siciliano

Phishing continues to become more sophisticated, more effective, and more prevalent. In one example, criminal hackers waited until Pennsylvania school administrators were on vacation, then used simple money transfers to liquidate over $440,000 out of the districts accounts...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Canadian Treasury and Finance Systems Hacked

February 19, 2011 Added by:Headlines

Attackers used targeted spear-phishing methods to gain access to executive's computers,then produced fraudulent emails that were sent out to numerous department staff. The emails contained attachments infected with malware that would harvest data and transmit the information to the attackers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Expect a Cyber Espionage Blitz in 2011

December 31, 2010 Added by:Headlines

Companies of all sizes that have any involvement in national security or major global economic activities — even peripherally, such as a law firm advising a corporate conglomerate starting business in another country — should expect to come under pervasive and continuous APT attacks...

Comments  (0)

Page « < 1 - 2 > »
Most Liked