Pünktlich zur Advents- und Vorweihnachtszeit werden wieder fleißig Phishing-Mails verschickt: Dieses Mal kommt die elektronische Post angeblich vom großen Online-Versandhändler Amazon.
Phishing-Angriffe sind keine neue Bedrohung – und so langsam wissen die meisten Nutzer, dass sie es vermeiden sollten, auf Links in merkwürdigen E-Mails oder Facebook-Beiträgen zu klicken. Dennoch gehen nach wie vor noch einige unbedarfte User Phishing-Betrügern ins Netz.
Der Anbieter von cloudbasierten Sicherheitslösungen CYREN hat heute seinen Trendbericht zu Internetgefahren für das dritte Quartal 2014 veröffentlicht. Die Ergebnisse zeigen, dass sich wohl auch Apple-Nutzer in Zukunft warm anziehen müssen. Aus der Analyse geht nämlich hervor, dass die Anzahl von Phishing-Angriffen in Bezug auf diese Zielgruppe im Vergleich zum ersten Quartal des Jahres um
Vor kurzem hat die Anti-Phishing Working Group (APWG) ihren halbjährlichen Global Phishing Report veröffentlicht, aus dem hervorgeht, dass die Anzahl an Phishing-Angriffen in der ersten Hälfte dieses Jahres wieder einmal gestiegen ist.
Independent security research has revealed that several 3G and 4G USB modems have security flaws which allow hackers access for phishing scams.
Hackers have stolen documents relating to law enforcement inquiries, through phishing attacks on employee emails, Microsoft has announced.
(All four blog articles in this series, of which this article is the last, are available as a single paper here: The_Thoughtful_Phisher_Revisited.) From the sort of ‘visit this link and update or we’ll cancel your account’ message that we saw in the previous blog in this series (The Less Thoughtful Phisher), it’s a short step
Less innovative than the scam mails described in my previous articles (Phish to phry and The Thoughtful Phisher II), there are those phish messages that suggest a problem with your account that they need you to log in to fix. (Of course, you aren’t really logging in to a legitimate site.) Mostly their appeal is
In the previous Thoughtful Phisher blog, we looked at some visual clues that should tip you off that a email from a ‘bank’ is not to be trusted. Just as interesting here, though, is the variety of social engineering gambits used by this wave of phish campaigns. It’s worth taking a closer look at some
[A much shorter version of this article appeared in the October 2013 Threat Radar Report as ‘The Thoughtful Phisher’. As these particular scam/spam campaigns don’t seem to be diminishing, however – indeed, some of the phishing techniques seem to be getting more sophisticated – I thought perhaps it was worth updating and expanding for a
Spear-phishing is creating a new era of cybercrime, according to Chris Dixon, a partner at venture capital firm Andreesen Horowitz – and in terms of its threat to enterprise, it’s comparable to a “super strain of bacteria.”
A new paper aims to profile the victims most likely to fall for a phishing attack. But what is less clear is how you develop a profile while avoiding the pitfalls of stereotyping.
[A shorter version of this article was originally published – without illustrations – on the Anti-Phishing Working Group’s eCrime blog.] Phishing attacks targeting academia aren’t the most high-profile of attacks, though they’re more common than you might think. Student populations in themselves constitute a sizeable pool of potential victims for money mule recruitment and other
Recently we realized that from time to time when people find a live link in one of our blogs, they click on it to see where it goes, even though the context might suggest that the link could be malicious. So we thought it might be a good idea to set up a link so
Below, you can see the textual part of a bank phishing email I received today (it also contained a Smile logo, which was the only graphical content). Here’s the message text from the phishing email: Dear Account Holder, Do you know that with Smile Internet banking, you can eliminate the cost of receiving and transferring
A shortened and updated version of the advice that David Harley and Andrew Lee gave to potential phish victims in an earlier paper. Part 3 of a three-part article on phishing scams old and new, and some of the ways to recognize the baited hook.