Ransomware scam collects fake fines from embarrassed victims

I have to hand it to cybercriminals, they're wily and they're hard working. They change tactics and techniques continuously to attract new prey and evade detection. Many are successful in tricking even the

Published on: November 21st, 2012 Paul Wood

A new take on an old scam

Example of a BBB spoofed email by Paul Wood Social engineering reared its ugly head in January. The latest intelligence report from Symantec saw businesses being targeted with emails purporting to be from

Published on: March 7th, 2012 Paul Wood

Beware of bogus Better Business Bureau e-mails

Cyber criminals are targeting businesses with malware-bearing e-mails purporting to originate from the Better Business Bureau, according to security software firm Symantec Corp .The same trend was spotted earlier by security company Sophos

Published on: February 29th, 2012 ITBusiness Staff

Hackers selling off Web credentials amassed in huge databases

Cyber-criminals have amassed so many credentials for various social networks and Web services that they are now creating the equivalent of discount factory outlets to sell them off, Trusteer Research reports. The Web

Published on: February 8th, 2012 ITBusiness Staff

New fraud scheme targets lawyers

by Monica Goyal If you are not a lawyer, you may not have heard of this fraud. Generally, the purpose of the scheme is to persuade a lawyer to take them on as

Published on: November 14th, 2011 Monica Goyal

Cyber criminals get more aggressive with social engineering tactics

by Matt Sergeant Cyber criminals are more aggressive with their social engineering tactics as evidenced in the September 2011 Symantec Intelligence Report. This month, roughly 72 per cent of all e-mail-borne malware contained

Published on: October 12th, 2011 ITBusiness Staff

Tumblr login credentials stolen in phishing attack

Tumblr is dealing with an aggressive phishing campaign. Only recently launched, it aims to steal log-in credentials and employs many of the well-known social engineering tactics that scammers use on social media sites

Published on: June 28th, 2011 Joan Goodchild

Windows users falling prey to social engineering tactics

The next time a web site says to download new software to view a movie or fix a problem, think twice. There's a pretty good chance that the program is malicious.In fact, about

Published on: May 19th, 2011 Robert McMillan

Mobile device are top security threat: survey

After application vulnerabilities, information security professionals are most concerned by the threats posed by mobile devices, a survey has revealed. The 2011 (ISC)2 Global Information Security Workforce Study, carried out by researchers Frost

Published on: February 18th, 2011 Anh Nguyen

2011 security predictions: Web attacks, social engineering and mobile nightmare

Aside from the festivities of the holidays, one thing that always makes December special is the combination of reflecting on the year gone by, and looking ahead to what the next year might

Published on: December 6th, 2010 Tony Bradley

Dating scams on the rise

Dating scams are a common spam email problem.  Spam relating to sex or dating currently accounts for approximately 4 per cent of global spam.  In a typical scam, a recipient (male or female)

Published on: September 22nd, 2010 ITBusiness Staff

Google attack — a security wake up call for all companies

Companies of sizes and in every sector should prepare for attacks similar to the one that prompted Google Inc. to consider pulling its operations out of China.The search engine giant had 20 employees

Published on: January 20th, 2010 Brian Jackson

Stressed out by spam? Here’s what you can do

Of 200 billion e-mail messages sent every day around the world in 2008, 90 per cent are considered spam – double the previous year's volume, according to Cisco Systems Inc.'s annual security report

Published on: January 20th, 2009 Vawn Himmelsbach