Mock Phishing Expedition Nets New York State Employees
Proving once again that the end user is the weakest point in an enterprise’s defense against spam and malware, the State of New York recently participated in a mock phishing attack with the Intrepidus...
View ArticleFedEx and Other Delivery Services Brand-Jacked by Spammers
There’s a new specific type of spam tactic assaulting email inboxes around the world right now in an attempt to spread Trojan viruses and other malware. Some of the largest botnets are currently...
View ArticleSpear Phishing on the Rise Following the Epsilon Breach
On March 30, 2011, the databases of the marketing firm Epsilon were successfully hacked by cybercriminals. The company handles email campaigns for many of the world’s largest corporations. In the...
View ArticleSony Struggles with Online Security Shortcomings
In the wake of a Sony PlayStation Network security breach and frequent security-related network outages, Sony is again getting bad press due to inadequate online security measures. Recently,...
View ArticleImposters Send Spam from Fake Apple Online Store
There’s a new presumed phishing campaign underway involving spam email messages alleging to be from Apple’s online store. The emails contain links that take you to a dummy website set up to closely...
View ArticleRecent Spam Phishing Trends and Targeting Free Online MMORPG Users
With the release of the Kaspersky Lab May 2011 internet security report, we’ve seen a slight dip in the use of phishing ploys in spam email messages. While the global spam rate rose 2.1 percentage...
View ArticleSpear Phishing in Workplace Email Accounts
Spear phishing, or targeted phishing, typically conjures up attempts by spammers to get user names and passwords that provide access to money, credit card numbers, or financial information. However,...
View ArticlePhishers Finding Uses for Cloud Computing Resources
Recently, phishers have been creating public documents and forms via cloud computing resources to harvest email addresses and associated passwords. Cloud computing allows people to access, create, and...
View Article