Blog Posts Tagged with "spear-phishing"


Email Authentication Rates Rise in 2011

October 05, 2011 Added by:Headlines

“The increased incidents of spear phishing targeting consumers, business and government users have accelerated the business value of email authentication. Organizations who fail to adopt are putting their employees, data and consumers at an unacceptable level of risk..."

Comments  (0)


Spear-Phishing Operation Targets Senior US Officials

August 16, 2011 Added by:Headlines

"Victims get a message from an address of a close associate or a collaborating organization/agency, which is spoofed. The message is crafted to look like a subscription form offering to enter Gmail credentials to activate it..."

Comments  (0)


Spear Phishing Leaves a Bloody Wound

July 19, 2011 Added by:Robert Siciliano

Once criminal hackers get a person’s username and email address, they can begin to launch a targeted spear phish scam. Scammers copy the design of each breached entities outgoing email campaign and blast the breached list with “account update” or other ruses...

Comments  (0)


This Article Has Been Has Been Re-Hashed Re-Hashed

June 14, 2011 Added by:J. Oquendo

Targeted phishing, aka spearfishing attacks, have been noticed since 9/11 and no one seems to have gotten their act together to defend against this attack. The attack itself is almost always defendable with, and I have stated this over and over again, Extrusion Prevention...

Comments  (0)


Chinese Hackers Spear-Phishing for US Military Secrets

April 23, 2011 Added by:Dan Dieterle

What could the Chinese hope to gain? Military secrets. Along with terabytes of data that have been stolen, the Chinese also obtained login credentials and blue prints to some of America’s hi-tech military equipment...

Comments  (0)


Spear-Phishing Season Is Declared Open

April 08, 2011 Added by:PCI Guru

Post-Epsilon breach, it seems every merchant under the sun is notifying their customers of the expected onslaught of electronic mail messages asking for bank account and credit card numbers among other PII. As a result, a lot of credit card numbers will likely get exposed. Be prepared...

Comments  (0)


Top Five Online Scams

March 16, 2011 Added by:Robert Siciliano

Phishing continues to become more sophisticated, more effective, and more prevalent. In one example, criminal hackers waited until Pennsylvania school administrators were on vacation, then used simple money transfers to liquidate over $440,000 out of the districts accounts...

Comments  (1)


Canadian Treasury and Finance Systems Hacked

February 19, 2011 Added by:Headlines

Attackers used targeted spear-phishing methods to gain access to executive's computers,then produced fraudulent emails that were sent out to numerous department staff. The emails contained attachments infected with malware that would harvest data and transmit the information to the attackers...

Comments  (0)


Researchers Expect a Cyber Espionage Blitz in 2011

December 31, 2010 Added by:Headlines

Companies of all sizes that have any involvement in national security or major global economic activities — even peripherally, such as a law firm advising a corporate conglomerate starting business in another country — should expect to come under pervasive and continuous APT attacks...

Comments  (0)

Page « < 1 - 2 > »