This week offered a lesson in how cybercriminals follow the news, and time their attacks to dupe the unwary – with several different attacks aimed at iPhone fans, in the week where Apple unveiled its iPhone 6.
This Thursday, September 18, is the biggest day in Scottish political history, as the country votes on whether it should become independent from the United Kingdom – but an ESET security expert has warned cybercriminals could strike.
The dangers of clicking on links in eBay scam postings were highlighted after a fake posting advertising iPhones linked to a phishing site designed to steal usernames and passwords for the site.
Facebook scams tend to crop up in the run-up to a big Apple launch with around the same regularity as big Apple launches themselves. This week’s iPhone 6 launch is no exception.
The sad truth is that scammers and fraudsters don’t have any conscience, and are prepared to do anything if it might net them a rich reward.
So it’s no surprise to see them taking advantage of the downing of Malaysia Airlines flight MH17 over Ukraine.
Three weeks ago, iSIGHT Partners discovered a new Ransomware encrypting victims’ documents. They dubbed this new threat TorrentLocker. TorrentLocker propagates via spam messages containing a link to a phishing page where the user is asked to download and execute “package tracking information”. In August, only Australians were targeted with fake Australian Post package-tracking page. While
A YouTube scam where users are threatened with suspension for an unspecified “violation” of the video site’s guidelines has been circulating via email. Here’s what to do if you get one.
A data breach of staggering proportions has hit South Korea – involving 27 million people and 220 million private records – all bought from hackers with the goal of stealing money from online games.
An image of a Russian car crash has piled up in Google Images – leading to speculation that the service has been hacked. What’s less clear is why, or who might have done it.
This week saw two of the scariest targets for hacks ever – nuclear plants and city-wide traffic systems. Tthe traffic-light hack could basically have paralyzedany one of 40 American cities, and America’s Nuclear Regulatory Commission was successfully attacked three times within the past three years.
The most famous traffic light ‘hack’ in history is in the classic film, The Italian Job (1969), where the heist involves paralyzing Turin via its traffic control system – but the reality is much easier.
Video games have gone since the late 1970s and early 1980s from being a small offshoot of the “traditional” computing industry to becoming a full-fledged multi-billion dollar industry – with its own brand of criminal.
Blackphone, billed as a privacy tool to keep the puplic safe ruled the headlines when it was is hacked in five minutes, Meanwhile, Wi-Fi routers were also shown up – and Android users face a toothy new threat,
Sick-hearted scammers have proven themselves to have no morals once again, exploiting the death of Robin Williams with their latest Facebook scam.
This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.
Using free cloud application hosting can allow an attacker to create a “free supercomputer” according to The Register’s report – used to mine cryptocurrency, researcher Oscar Salazar warns.
Account hackers and thieves who loot magic weapons, armor and hard-won game currency from players in massively multiplayer titles such as World of Warcraft should face the same sentences as real-world thieves, a politician has suggested.
Callous cybercriminals have used the Malaysia Airlines Flight MH17 tragedy as a lure for Facebook scams – creating fake profiles for victims of the crash.