There were 35,831 phishing attacks launched around the world in June, according to the RSAs latest report. The phishing trend seems positive
Browsing: Phishing
When we discuss exploit prevention, we often talk about ‘targeted applications.’ This term refers to end-user applications which can be exploited by hackers for malicious purposes. There are a few requirements that define these applications.
Cybercriminals have compromised the website of an India-based software company and they’re abusing it to host phishing pages and other malicious elements.
Gaming Companies, and especially those who provide a cloud service for either online play or account management are a great and very compelling target for attackers.
User-profiling is an interesting approach to countering phishing.
The primary approaches used to fight cybercrime over the past several years simply aren’t effective.
In-browser security specialist Trusteer has published a white paper – Stepping Up the Battle Against Advanced Threats – and which says the endpoint has become the path of least resistance for cybercriminals
While UK and US unemployment figures are falling slightly, times are still difficult for many workers, and few are changing roles.
In its simplest form, online banking fraud is a relatively straightforward process. Like all fraud chains, it can be split to main two parts: obtaining compromised credentials and cashout.
Free the User | Contain the Threat – Invincea Webinar on Friday, August 9th, 2013 at 2:00 PM EDT