Quantcast
Channel: MX Police » Phishing
Browsing latest articles
Browse All 8 View Live

Image may be NSFW.
Clik here to view.

Mock Phishing Expedition Nets New York State Employees

Proving once again that the end user is the weakest point in an enterprise’s defense against spam and malware, the State of New York recently participated in a mock phishing attack with the Intrepidus...

View Article



Image may be NSFW.
Clik here to view.

FedEx and Other Delivery Services Brand-Jacked by Spammers

There’s a new specific type of spam tactic assaulting email inboxes around the world right now in an attempt to spread Trojan viruses and other malware. Some of the largest botnets are currently...

View Article

Image may be NSFW.
Clik here to view.

Spear Phishing on the Rise Following the Epsilon Breach

On March 30, 2011, the databases of the marketing firm Epsilon were successfully hacked by cybercriminals. The company handles email campaigns for many of the world’s largest corporations. In the...

View Article

Image may be NSFW.
Clik here to view.

Sony Struggles with Online Security Shortcomings

In the wake of a Sony PlayStation Network security breach and frequent security-related network outages, Sony is again getting bad press due to inadequate online security measures. Recently,...

View Article

Image may be NSFW.
Clik here to view.

Imposters Send Spam from Fake Apple Online Store

There’s a new presumed phishing campaign underway involving spam email messages alleging to be from Apple’s online store. The emails contain links that take you to a dummy website set up to closely...

View Article


Image may be NSFW.
Clik here to view.

Recent Spam Phishing Trends and Targeting Free Online MMORPG Users

With the release of the Kaspersky Lab May 2011 internet security report, we’ve seen a slight dip in the use of phishing ploys in spam email messages. While the global spam rate rose 2.1 percentage...

View Article

Image may be NSFW.
Clik here to view.

Spear Phishing in Workplace Email Accounts

Spear phishing, or targeted phishing, typically conjures up attempts by spammers to get user names and passwords that provide access to money, credit card numbers, or financial information. However,...

View Article

Image may be NSFW.
Clik here to view.

Phishers Finding Uses for Cloud Computing Resources

Recently, phishers have been creating public documents and forms via cloud computing resources to harvest email addresses and associated passwords. Cloud computing allows people to access, create, and...

View Article

Browsing latest articles
Browse All 8 View Live


Latest Images