What is spear phishing? Examples, tactics, and techniques | CSO Online

Spear phishing messages are crafted with care using social engineering techniques and are difficult to defend against with technical means alone. And they’re ruthlessly efficient.

Hackers phish finance orgs using trojanized Minesweeper clone

Hackers are utilizing code from a Python clone of Microsoft’s venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations.

CasperSecurity Stealer Attacking Windows Machine

This complex malware is made to steal Remote Desktop Protocol (RDP) credentials, which is very dangerous for individuals and businesses.

FCC Reveals ‘Royal Tiger’ Robocall Campaign

An example of a transcript of a call that Royal Tiger feeds its victims is as follows: “This is an important call regarding illegal enforcement action being executed under your name for suspicious and fraudulent activities carried out using your identity.

Hackers Can Abuse Apple’s Wi-Fi Positioning System

A recent study by security researchers has revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows hackers to track the locations of Wi-Fi access points and their owners globally.

Hackers Exploiting Quick Assist Tool To Deliver Ransomware

Hackers often target remote assist tools because they create a direct channel to access desired systems with minimum effort. 

Crooks plant backdoor in software used by courtrooms around the world | Ars Technica

A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack

Skimmer found on self-checkout register inside Wawa

A credit card skimmer was found inside a Wawa gas station in Baltimore County.

Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech | WIRED

For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.

Phishing statistics that will make you think twice before clicking – Help Net Security

This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.