Phishing psychology: The prevalence effect
Credit to Author: Anastasiya Gridasova| Date: Thu, 28 Nov 2019 16:14:07 +0000
One explanation of phishing success lies in a known psychological effect.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: Anastasiya Gridasova| Date: Thu, 28 Nov 2019 16:14:07 +0000
One explanation of phishing success lies in a known psychological effect.
Read MoreCredit to Author: William Tsing| Date: Tue, 26 Nov 2019 17:09:34 +0000
![]() | |
We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of… Categories: Tags: bitcoinscamsextortion scamsspam |
The post Sextortion scammers getting creative appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Sushmita Kalashikar| Date: Fri, 22 Nov 2019 13:08:42 +0000
The recent news of Pegasus spyware attack via WhatsApp that targeted lawyers, journalists and human rights activists, offers an astonishing revelation on the kind of havoc such spyware can create. We covered the topic extensively, recently. The frequent media buzz about the recent incident of snooping by Pegasus spyware which…
Read MoreCredit to Author: Christopher Boyd| Date: Wed, 20 Nov 2019 16:00:00 +0000
![]() | |
Don’t discount deepfakes just yet. We may not be fooled by phony Mark Zuckerberg anymore, but the discovery of a fake LinkedIn profile sporting a deepfake avatar shows how social engineering can deceive through the mundane. Categories: Tags: AIcomputer generateddeepfakesfakeskatie jonesLinkedInmuniraSocial Engineeringstratcom |
The post Deepfakes and LinkedIn: malign interference campaigns appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Jovi Umawing| Date: Thu, 07 Nov 2019 21:49:16 +0000
![]() | |
Vendor email compromise (VEC) is a new cybersecurity term for a familiar practice, taken to the thousandth degree. Learn the similarities with business email compromise and how your organization can protect against them both. Categories: Tags: account takeoverACIDAgariAgari Cyber Intelligence DivisionATObecbusiness cyberattacksBusiness Email Compromisebusiness threatsNigerian scammerphishingSilent StarlingSocial EngineeringVECvendor email compromise |
The post Not us, YOU: vendor email compromise explained appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Anjali Raut| Date: Sat, 02 Nov 2019 12:56:15 +0000
Use of Phishing emails is not new for cyber-attack and is still one of the classic strategies to compromise a victim’s machine. Cyber criminals lure victims to open email attachments (mostly Doc and XLS files) by faking them to look like important one using keywords like invoice, payment, finance, order…
Read MoreCredit to Author: Christopher Boyd| Date: Wed, 30 Oct 2019 20:36:21 +0000
![]() | |
Scammers will stop at nothing—not even a tragic natural disaster—for a chance to cash in. We offer some helpful tips to avoid disaster donation scams. Categories: Tags: 419419 scamscharitycold call scamscold callsdisasterdonation scamsnatural disasternatural disaster scamnatural disastersphishphishingred crossscammersscammingscamsSocial Engineeringsocial engineering attacks |
The post Help prevent disaster donation scams from causing more misery appeared first on Malwarebytes Labs.
Read MoreCredit to Author: Osama Tahir| Date: Fri, 25 Oct 2019 15:37:31 +0000
![]() | |
Doxing, or collecting and spreading private information about a user online, is a form of cyber harassment, stalking, and even a potential threat to physical safety. Here’s what you can do to protect yourself against it. Categories: Tags: doxdoxerdoxingIP addressmobile VPNsonline privacypassword managerpersonal datapersonally identifiable informationprivacySocial Engineeringsocial mediavpnVPNsWHOIS |
The post How to protect yourself from doxing appeared first on Malwarebytes Labs.
Read More