A record number of brands were targeted by phishers in the second quarter of 2013, according to APWG.
Senior Research Analyst Jeremy Scott received a phone call from “the service center for the Windows operating system computers” and they told him that he had something much worse than viruses," he had "malwares and spywares” and that they wanted to help remove it.
Once again, and more spectacularly, security researchers have proved that attackers wielding a fake LinkedIn account sporting the image of an attractive woman claiming to be an expert in the cyber security business can trick even security-aware IT employees into letting their guard down.
Social networks are great sources of information for cyber criminals and a great way to enter the potential victims’ circle of trust.
During Social Engineer Capture the Flag contest, one of the most prominent and popular annual events at DEF CON 21, a pool of 10 men and 10 women, from diverse backgrounds and experience levels, tested their social engineering abilities against 10 of the biggest global corporations, including Apple, Boeing, Exxon, General Dynamics and General Electric.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.