from Reuters: Technology News https://ift.tt/2LOHuuu
Argentina's Mendoza province becomes first to pass law allowing Uber
from Reuters: Technology News https://ift.tt/2LOHuuu
U.S. government seeks to boost collaboration with industry on hacks
from Reuters: Technology News https://ift.tt/2M7a86X
Akamai profit beats on strength in cloud security business
from Reuters: Technology News https://ift.tt/2NXcoOE
Apple earnings beat expectations as it sells pricier iPhones
from Reuters: Technology News https://ift.tt/2LEj8El
Pandora wins more paid subscribers, posts smaller quarterly loss
from Reuters: Technology News https://ift.tt/2Kgk5NH
Pandora reports smaller loss as paid subscriber base grows
from Reuters: Technology News https://ift.tt/2OwPmPG
Akamai quarterly revenue rises 9.4 percent
from Reuters: Technology News https://ift.tt/2ArRgOz
Facebook Uncovers New Fake Accounts Ahead of Midterm Elections
from Security Latest https://ift.tt/2OB6uEa
The National Risk Management Center Will Combat Critical Infrastructure Hacks
from Security Latest https://ift.tt/2LOKyGT
Cryptocurrency exchange Coinbase hires chief compliance officer
from Reuters: Technology News https://ift.tt/2O0U0Vf
SamSam Ransomware Attacks Extorted Nearly $6 Million
from The Hacker News https://ift.tt/2LLH4Fh
The Last-Ditch Legal Fight to Stop 3-D Printed Guns
from Security Latest https://ift.tt/2LDDb5O
Bitcoin drops 5 percent to one-week low, briefly below $7,700
from Reuters: Technology News https://ift.tt/2LRQD5i
UPS partners with LA-based startup to develop electric delivery truck
from Reuters: Technology News https://ift.tt/2NYpQSe
Phishing, Part 1: On the Lookout
Cybersecurity has gone mainstream, thanks in part to the hacking of the 2016 Presidential election. But how many of us know how the attackers in this case actually achieved their ends? The truth is, that one of the oldest, but most effective weapons in the cybercriminal’s arsenal, undoubtedly used in those attacks, is a threat still facing all of us today: phishing.
Phishing can be the first stage in a sophisticated information-stealing attack on a large organization. But the same techniques are used by cybercriminals the world over to steal your personal information for ID theft and to spread dangerous malware. With this in mind, Trend Micro has put together a handy two-part guide giving you the lowdown on phishing attacks—what they’re designed to do, what they look like, and how you can avoid getting caught by the hoax.
Why do cybercriminals phish?
Phishing is fundamentally a confidence trick. It’s an attempt by hackers to get their hands on your online log-ins, your financial information, or other sensitive details they can use to impersonate you for monetary gain. They do this by persuading you they’re someone else—typically a familiar organization you work with. They might want to steal your bank log-ins, your Apple ID, even your Uber account credentials. ID theft is particularly dangerous, since it can open up a world of credit or purchases for them. Or they might try to trick you into downloading ransomware, crypto-mining software, banking Trojans, adware or even info-stealing malware, to help them generate profits. Phishing represents a potential cornucopia for them, of ill-gotten gain.
How do they phish?
The bad guys have a wealth of techniques at their disposal, but they mostly boil down to one thing: social engineering. Fundamentally, this is the art of persuasion. As mentioned, it could mean spoofing an email to appear as if it came from your bank, asking you to update your details with them. Or perhaps it’s a ‘security alert’ that appears to have been sent by Apple or Microsoft. Or maybe it’s a required software update from Adobe, typically around Adobe Flash. Or it might even be a too-good-to-miss offer or piece of outrageous gossip to click on social media.
It’s all about getting you to click on that malicious link, open that malware-laden attachment, or submit your log-ins and personal details. Sometimes you’re taken to a separate website to submit those details, also spoofed to appear legitimate. The idea is to first target the user, rather than attack the machine directly. That being the case, if you improve your awareness of the characteristics of phishing, you can minimize the effectiveness of the phishers.
Phishing types
Here a few common generic phishing attacks:
|
|
The scammers are getting smarter
The bad news is that the phishers are refining their tactics all the time. Mobile phishing attacks are increasingly popular as users tend to be distracted and therefore more likely to click through in malicious SMS messages. Phishers are also increasingly likely to use popular events in the news to trick you into clicking, as with a major data breach like Yahoo or Uber, which you may have been caught up in.
Another tactic designed to increase the chances of phishing success is to use to spoof the domains of legitimate sites by using internationalized domain name text. Then too, you need to beware of new “angler” attacks, which typically involve the creation of fake social media profiles resembling brands’ support accounts. Criminals will search for users contacting those companies and hijack the conversation with phishing links.
So what can you do to protect yourself from phishing attacks?
Stay tuned for Phishing, Part 2: Staying Safe, where we’ll brief you on ways to stay safe from phishing attacks.
The post Phishing, Part 1: On the Lookout appeared first on .
from Trend Micro Simply Security https://ift.tt/2AnPRsg
Cisco Certification Training Courses | Ultimate 9-Part Bundle
from The Hacker News https://ift.tt/2LWq6Bh
Chinese smartphone maker OnePlus to expand retail store presence in India
from Reuters: Technology News https://ift.tt/2Ox3ad6
Dixons Carphone says 10 million accounts may have been hit in 2017 cyber attack
from Reuters: Technology News https://ift.tt/2As8QSD
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...
-
Original release date: November 08, 2018 Summary JBoss Verify and EXploitation tool (JexBoss) is an open-source tool used by cybersecurity...
-
Original release date: May 21, 2018 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded b...
-
Original release date: January 29, 2018 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been record...
-
It's no secret that learning how to code is one of the most important things you can do when it comes to the beginning or furthering pra...
-
Original release date: February 12, 2018 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recor...
-
Original release date: February 26, 2018 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recor...
-
Os estragos causados pelo ataque com ransomware ao Superior Tribunal de Justiça (STJ) ainda não são totalmente conhecidos. A Polícia Federa...
-
Original release date: March 9, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD . In som...
-
Original release date: October 26, 2020 The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD . In...
-
Original release date: January 08, 2018 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been record...