Security awareness is always the first step to digital safety. But what if cybercriminals used this sentiment to lure victims into downloading malware?
Understanding how social engineering is done, and the types of lures that are usually used, is the first step towards preventing them. Here's a look at the most popular lures used in 2014.
Planning on catching a flick for the holidays? Make sure cybercriminals don't catch you with your guard down. Here's a list of threats that take advantage of the seasons most popular releases.
As news about the Ebola pandemic flooded the Internet, cybercriminals and have seized the opportunity to use the popularity of the topic as bait to lure unsuspecting victims to pages that could be used to steal their information and credentials.
Transformers, 22 Jump Street, Godzilla - these are some of the movie titles that get our attention. Cybercriminals also use these titles to lure users into traps built into sites like Tumblr and WordPress.
Hours after the fateful crash of Malaysia Airlines 777, suspicious .tk links on Twitter posts led to spyware downloads, while “actual footage“ posts on Facebook pointed to adware.
NBC News teamed up with Trend Micro for a honeypot experiment designed to check the security of consumer-grade gadgets in time for the 2014 Sochi Winter Olympics. The results show the need for tougher mobile security.