social engineering

Visit/phishing/34723/businesses-stung-by-highly-convincing-office-365-voicemail-scam
phishing

Businesses stung by convincing Office 365 voicemail scam

This latest wave of phishing attacks incorporates real audio recordings to create a sense of urgency
31 Oct 2019
Visit/security/34475/nhs-staff-issued-with-fresh-cyber-security-guidance
Security

NHS staff issued with fresh cyber security guidance

New campaign focuses on password security, phishing, social engineering, and on-site 'tailgating'
23 Sep 2019
Visit/security/34374/fbi-embarks-on-cyber-criminal-detainment-spree
Arrest
Security

FBI embarks on cyber criminal detainment spree

Coordinated effort leads to hundreds of arrests and $3.7 million seized from phishing gangs around the world
11 Sep 2019
Visit/security/34320/hackers-exploiting-popular-social-engineering-toolkits-to-refine-cyber-attacks
Security

Hackers exploiting social engineering 'toolkits'

Victims are being asked to download malware through visually compelling fake update prompts
4 Sep 2019
Advertisement
Visit/social-engineering/34308/fraudsters-use-ai-voice-manipulation-to-steal-200000
social engineering

Fraudsters use AI voice manipulation to steal £200,000

Bold social engineering attack could be the first of many powered by machine learning
2 Sep 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/security/33779/how-mr-robot-fudged-its-hacks-to-protect-the-public
Mr. Robot poster
Security

How Mr. Robot ‘fudged’ its hacks to protect the public

Showrunners debated over how accurate to make the show’s exploits
5 Jun 2019
Visit/security/33179/email-verification-service-takes-itself-offline-after-800-million-records-get
Image depicting email security
Security

Service takes itself offline after 800m records exposed

Researchers find a non-protected MongoDB instance amounting to 150GB of unique data
8 Mar 2019
Visit/two-factor-authentication-2fa/32689/phishing-tool-that-bypasses-gmail-2fa-released-on-github
two-factor authentication (2FA)

Modlishka tool can allow attackers to bypass 2FA

The reverse proxy 'Modlishka' tool is designed to make phishing attacks as "effective as possible"
9 Jan 2019
Advertisement
Visit/security/31662/new-facial-recognition-tool-could-help-white-hat-hackers-harvest-social-media
Surveillance, machine learning, facial recognition
Security

Face recognition tool could slurp Facebook data

Security company claims software creates a level playing field for white hats and pen testers
10 Aug 2018
Visit/hacking/30203/what-is-hacktivism
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
9 Aug 2018
Advertisement
Visit/security/31527/how-russia-hacked-the-2016-election
Security

How Russia hacked the 2016 election

A timeline of how 12 hackers allegedly corrupted the world's most powerful democracy
18 Jul 2018
Visit/social-engineering/30017/social-engineering-the-biggest-security-risk-to-your-business
social engineering

Social engineering: your business' biggest security risk

It's not your network, but your own well-meaning employees that could be the gateway for hackers
23 May 2018
Visit/cyber-security/30609/de-montfort-university-launches-a-week-of-cyber-security-events
cyber security

De Montfort University launches a week of infosec events

DMU students will be able to gain practical experience from industry experts
23 Feb 2018
Visit/digital-currency/30516/cryptocurrency-miners-the-latest-tool-for-cyber-criminals
digital currency

Cryptocurrency miners: the latest tool for cyber criminals

Learn more about the new form of cyber crime that is being driven by cryptocurrency fever
13 Feb 2018
Advertisement
Visit/security/30089/3-reasons-why-nadine-dorries-is-totally-wrong-about-password-sharing
Security

Why Nadine Dorries is totally wrong about password sharing

Frustration abounds as MPs expose their backwards security practises
4 Dec 2017
Visit/cyber-crime/30078/uk-cops-to-lose-access-to-europols-cyber-crime-resources-after-brexit
Police lamp
cyber crime

UK cops to lose access to Europol's cyber crime resources

Cyber cops will be on their own once Britain leaves the EU
1 Dec 2017
Visit/strategy/28290/tim-berners-lee-how-we-can-win-back-the-web
Business strategy

Tim Berners-Lee: How we can win back the web

The public must reject misinformation and keep control of their own data
13 Mar 2017
Visit/malware/21766/malware-infected-ads-now-greatest-threat-to-mobile-security
malware

Malware-infected ads now greatest threat to mobile security

Porn slips into second place as main vector for attack on smartphones.
5 Mar 2014
Visit/630754/anonymous-hackers-hit-fbi-collaborator
Hacker
public sector

Anonymous hackers hit FBI collaborator

Anonymous compromises various HBGary Federal websites and accesses around 50,000 emails.
7 Feb 2011
Visit/629674/security-threats-to-beware-in-2011/page/0/2
2011
Security

Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.
3 Jan 2011
Advertisement
Visit/629674/security-threats-to-beware-in-2011
2011
Security

Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.
3 Jan 2011
Visit/629674/security-threats-to-beware-in-2011/page/0/1
2011
Security

Security threats to beware in 2011

We take a look ahead to what threats await us in 2011.
3 Jan 2011