Blog Posts Tagged with "spear-phishing"

1652a0b8730e4cd4fec952262d1bed73

Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks

November 07, 2017 Added by:Asaf Cidon

Artificial intelligence to stop spear phishing sounds futuristic and out of reach, but it’s in the market today and attainable for businesses of all sizes, because every business is a potential target.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Beyond Phishing: What You Need to Know About Whaling

June 13, 2016 Added by:Dan Lohrmann

Just when you thought you had seen it all regarding online phishing scams, along comes a new round of deceptive emails, phones calls, instant messages and even traditional printouts from your fax machine.

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Chinese cyber attack against the White House

October 02, 2012 Added by:Pierluigi Paganini

The news is circulating on the internet creating great concern once again that Chinese hackers have hit the infrastructure of a foreign state, and once again we are speaking of cyber espionage, but this time they were able to access the White House Military Office...

Comments  (2)

03b2ceb73723f8b53cd533e4fba898ee

FireEye Advanced Threat Report: The Inadequacy of Defenses

September 12, 2012 Added by:Pierluigi Paganini

The security firm FireEye has released an interesting report that provides an overview of the current threat landscape, evolving malware, advanced persistent threat (APT) tactics, and the level of infiltration seen in organizations’ networks today. The report presents an alarming scenario ...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Cyberheists: Biggest Threat Facing American Businesses

August 28, 2012 Added by:Ben Rothke

It is no myth that there is plenty of money and digital assets on networks worldwide. Those that want to secure those assets need to safeguard them. This book is written specifically for smaller to medium size businesses that often lack the staff and budget necessary to ensure effective information security...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Mahdi Trojan Employed in Middle Eastern Cyber Espionage

July 18, 2012 Added by:Headlines

"It is still unclear whether this is a state-sponsored attack or not. The targeted organizations seem to be spread between members of the attacking group by giving each victim machine a specific prefix name, meaning that this operation might require a large investment and financial backing..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Harvesting Credentials with the Social Engineering Toolkit

July 09, 2012 Added by:Dan Dieterle

The Social Engineering Toolkit included with Backtrack 5 is a great way for penetration testers to see how well their network and users would stand up to Social Engineering attacks. In this tutorial I will demonstrate how SET can be used to set up a realistic looking website to harvest e-mail usernames and passwords...

Comments  (3)

296634767383f056e82787fcb3b94864

Google's Worst Security Idea Ever

June 06, 2012 Added by:Jeffrey Carr

Google announced that it will notify a subset of its Gmail customers if they're the victim of a State-sponsored attack. Google's advice is FUD-inducing for people who aren't targets and insufficient for those who are. I have to wonder what Google was thinking when it created this awful program...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Gas Pipeline Companies Under Major Cyber Attack

May 07, 2012 Added by:Headlines

“Analysis of the malware and artifacts associated with these cyber attacks has positively identified this activity as related to a single campaign from a single source. It goes on to broadly describe a sophisticated 'spear-phishing' campaign..."

Comments  (1)

54b393d8c5ad38d03c46d060fa365773

Nine Tips for CSOs to Get a Fresh Start this Spring

April 13, 2012 Added by:Jason Clark

With everything in the threat landscape changing so frequently, it’s important to reassess your current status and plan for the coming year, whenever we can come up for air. So, I came up with the following nine tips to help you get a fresh start this spring...

Comments  (1)

B8db824b8b275afb1f4160f03cd3f733

Disclosures: How Much Sharing is Too Much?

February 15, 2012 Added by:Jack Daniel

What is the point of telling you I was compromised by spear phishing, SQL injection, cross site scripting, cross site request forgery, default credentials, or anything else we’ve know about for years? If you are ignoring all of the well-known risks, it is a waste of time...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

MSUpdater Trojan Smuggles Data as Windows Update Traffic

February 01, 2012 Added by:Headlines

"We don't have information about the people behind those attacks, however as all of them are targeting government-related organizations, it is highly reasonable to suspect that the attackers are high profile, maybe even a country..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec: Chinese Connection to Attacks on Defense Contractors

January 27, 2012 Added by:Headlines

The data Symantec published reinforces evidence from an earlier investigation conducted by AlienVault, which described an orchestrated sprear-phishing campaign most likely targeting information on US drone technology which utilized malware-infected PDF documents to deliver the Sykipot payload...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Federal Agencies Tap Online Trust Alliance for Training

November 17, 2011 Added by:Headlines

“Authentication is the front line defense... This program, supported by the White House, will help stem the tide of malicious and deceptive email. This is a great example of the public and private sector working together to increase end-to-end trust of our nation’s critical infrastructure..."

Comments  (0)

3750d420f6c2a9844b529978894dc0be

Steam Attack Puts Users at Risk of Spear Phishing

November 15, 2011 Added by:Josh Shaul

A good implementation of salting before hashing can yield very secure results – however weak implementations that used fixed salt are not all that unusual, and those are quite easy to break. The stored credit card numbers were encrypted. It’s likely that these will be difficult to extract...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Are You Cyber Savvy?

October 25, 2011 Added by:Joel Harding

What really set him apart was Social Engineering combined with his hacking. He did his research, he would study, he would probe, and then he would do whatever it took to get a password, to get a free account, to get root access, to get into a facility and physically touch the system...

Comments  (0)

Page « < 1 - 2 > »