Spear phishing messages are crafted with care using social engineering techniques and are difficult to defend against with technical means alone. And they’re ruthlessly efficient.
Category: Cyber Crime
Hackers phish finance orgs using trojanized Minesweeper clone
Hackers are utilizing code from a Python clone of Microsoft’s venerable Minesweeper game to hide malicious scripts in attacks on European and US financial organizations.
FCC Reveals ‘Royal Tiger’ Robocall Campaign
An example of a transcript of a call that Royal Tiger feeds its victims is as follows: “This is an important call regarding illegal enforcement action being executed under your name for suspicious and fraudulent activities carried out using your identity.
Hackers Can Abuse Apple’s Wi-Fi Positioning System
A recent study by security researchers has revealed a major privacy vulnerability in Apple’s Wi-Fi Positioning System (WPS) that allows hackers to track the locations of Wi-Fi access points and their owners globally.
Crooks plant backdoor in software used by courtrooms around the world | Ars Technica
A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack
Skimmer found on self-checkout register inside Wawa
A credit card skimmer was found inside a Wawa gas station in Baltimore County.
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech | WIRED
For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.
Phishing statistics that will make you think twice before clicking – Help Net Security
This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.