Phishing emails attempt to acquire your sensitive information – account information or passwords, for example – by masquerading as a legitimate source….
Month: October 2015
Bizarre Essex Police #cyberaware Tweet Mystery
It may well be National Cyber Security Awareness Month, but no matter who you are things can still go wrong in…
This isn’t the Java I ordered!
On several sites, we have seen reports of popups that look very similar to the one Java used to notify users…
Steer Clear of this Apple Invoice Phish
Coming soon to a mailbox near you: a blatant attempt to swipe your payment information. Couched in the well-worn guise of…
Beware of DOC! A look at malicious macros
Some malware families often use spam campaigns as a method of distribution. Usually they deploy simple social engineering tricks – trying…
Kampagnen Malvertising Campaign Goes After German Users
Update (11/9/2105): This campaign is still active and we catch up with it again: berlin-auto.space/deliver2/deliver2?kampagnen=29&ads=2&adl=VviuKIfBb8b9stgEwY6o5QcAAAAQASCBssUgOABYmYK5u3JglYKAgLAHsgELd3d3Lm5ld3MuZGW6AQlnZn&r_id=0.0472178136001 Interesting to note that the registrant…
APAC is Ready for ACFE’s Annual Fraud Conference
The Association of Certified Fraud Examiners, or ACFE, the world’s largest anti-fraud group, will be holding its annual Fraud Conference in…
Tech Support Scammers Impersonate Apple Technicians
Remote assistance is becoming more and more popular to troubleshoot computer issues without the hassle of bringing the problematic machine to…
Fraud Tactics Against Chip-and-PIN Technology
October 1 came and went in the US, marking the beginning of the “liability shift” wherein when fraud occurs, the card…
A Week in Security (Oct 11 – Oct 17)
Last week, we touched on Mozilla’s add-on guidelines for the Firefox browser; questioned the possibility of adware using the popular compression…