This research paper offers a look into the activities and methods used by Rocket Kitten, a group behind cyber attacks on Israeli and European organizations
Online and offline threats abound during tax season. The latest: calls from fake IRS agents taking advantage of unsuspecting victims, reportedly scaring their victims into paying up.
Certain consumer-grade Lenovo laptop models shipped out between September and December 2014 came pre-installed with Superfish, a visual search technology that not only exhibits adware behaviors, but also allows cybercriminals to snoop in secure communications
Thanksgiving and shopping holidays are coming up, but cybercriminals work overtime during this season. This year, take the safe route and learn how you can avoid spam email and other online threats.
Operation Huyao is a phishing attack that targets online shoppers without having to create a copy of the legitimate website. Before starting your online shopping spree, know how you can shop safely during the coming holidays.
This Halloween, we’ve rounded up ten of the scariest tactics cybercriminals use to trick users into clicking on malicious links, open suspicious attachments, install fake software, and more.
This Operation Pawn Storm attack scenario involves the use of phishing emails. See how one line of Javascript code could place millions of Outlook Web Access (OWA) users at risk of becoming victims of a simple, but clever phishing attack.
This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.
Twitter is a very popular online social platform because it's lightweight, easy to use, and widely adopted. Unfortunately these reasons also make it a prime target for abuse. See how this is done, and how to avoid being a victim.