category
Social Engineering

‘Sextortion’ blackmail attacks on the rise, Police warn

‘Sextortion’ attacks where cybercriminals blackmail victims with the threat of exposing explicit photographs or messages are increasingly common, according to a report by Bloomberg News.

How cybercriminals ‘market’ email attacks – and why LinkedIn lures are today’s prize phish

Cybercriminals ‘manage’ phishing emails using techniques similar to those used by marketing agencies, including the use of ‘test audiences’ to see how effective a particular email is, according to an email security specialist.

Overconfident? Introverted? Study reveals personality traits of “perfect” phishing victims

A new study aims to identify the sort of people who are most likely to fall for phishing scams – and has found that women, introverts and the overconfident are more likely to confuse “real” email with phishing scams.

Social Engineering, Management, and Security

A BYOD dissonance between economic imperative and loss of central control? Discontented staff susceptible to social engineering? David Harley reflects on aspects of Business Reimagined, a new book by Dave Coplin, chief envisioning officer at Microsoft UK, interivewed by Ross McGuinness in Metro.

Twitter blames spear-phishing for recent hacks – and warns news companies to expect more

Twitter has warned media companies that attacks on their official Twitter accounts are liable to continue, after Britain’s Guardian newspaper became the latest high-profile news site to fall victim.

Hacked CBS Twitter accounts present followers with malware-tainted “news”

Twitter accounts used by CBS News were compromised on Saturday – and began serving up bogus news stories with links to malware.

Spammers leverage news of a new Pope and other world events

Major world events always bring with them an upsurge in related spam and the election and inauguration of a new Pope is no exception.

Hundreds of thousands of Facebook likes can certainly be wrong

Issues with malware are always with us. There may or may not be a current media storm, or companies hoping for a slice of the anti-malware pie by proclaiming the death of antivirus in a press release, but AV labs continue to slog their way every day through tens of thousands of potentially malicious samples.

Ransomware Part III: another drop of the Irish

Where to find more information about current trends in international ransomware design.

Authentication attacks: Apple, Amazon, iCloud, Google, anything with a password

Sharing details of the hack that “wiped his life” has earned Mat Honan a place in the annals of information system security; the specific inter-dependence of flawed authentication systems that cost him so dearly–encompassing Apple, iCloud, Amazon.com, Gmail and more–would probably still exist if Mat had not gone public. Wired has the full story here

Support scams: social engineering update

More cold-call/support scam information.

Close call with a Caribbean cruise line scam

In the middle of working on a blog post about SMS phishing scams at my desk last night, I received a rather strange call.  The number displayed on the Caller ID was +1 (360) 474-3925.  I did not recognize the number, but since it was 7:10PM, I assumed it was a colleague trying to reach

SMSmishing Unabated: Best Buy targeted by fake gift card campaign

News of SMS (text) phishing scams are nothing new to readers of this blog.  ESET researcher Cameron Camp recently wrote an article explaining how they work and how to avoid them here on ESET’s Threat Blog: SMSmishing (SMS Text Phishing) – how to spot and avoid scams, And just before Valentine’s Day, my colleague Stephen

Press One if by LAN, Two if by Sea

At ESET, we spend a great deal of time researching the latest technologies and how they may be affected by frauds and scams. Sometimes these are “old fashioned” spam through email, or they may be programs like fake antivirus programs or ransomware. And we certainly have blogged extensively about PC support scams where the caller

Modern viral propagation: Facebook, shocking videos, browser plugins

Fraudsters continue to innovate their scam propagation methods. Again using Facebook and a pretense of a shocking video, they also utilize browser plugins to execute malicious scripts. We also see how the malware scene is intertwined, when the user is directed to a dubious Potentially Unwanted Application. Facebook auto-like scams have been commonplace on the

Cybercrime, Cyberpolicing, and the Public

Security can’t be purely the responsibility of the government, the police, the security industry, the ISPs, the public sector, private industry, or any permutation thereof.

Valentine's Day Scams: For the love of money

Scam artists and cybercriminals are looking to turn romance into profit now that Valentine's Day approaches, possibly taking over your computer in the process. According to ESET researchers in Latin America, we can expect the quest for love to be leveraged as an effective social engineering ploy to enable the bad guys to infect unsuspecting

Anonymous and the Megaupload Aftermath: Hacktivism or Just Plain Ugly?

Yesterday’s announcement by the US Department of Justice that the operators of file-sharing site Megaupload had been indicted for operating a criminal enterprise that generated over $175 million by trafficking in over half a billion dollars of pirated copyrighted material has sent shockwaves across the Internet. The accuracy of those figures may be questionable, but

Beware of SOPA Scams

Tomorrow, on January 18, 2012, dozens of popular websites covering a diverse range of subjects will be blacking out their home pages in protest of the U.S. Stop Online Piracy Act (SOPA).  Some of these websites are well-known, such as the English language web site for the encyclopedic Wikipedia and quirky news site Boing Boing,

HTML/Scrinject: surfing for cheap thrills at XXXmas?

Do Xmas shopping and porn surfing account for a spike in Win32/Scrinject detections?

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

4 articles related to:
Hot Topic
21 Jul 2014
ESET Virus Radar

Archives

Select month
Copyright © 2014 ESET, All Rights Reserved.