This Halloween, we’ve rounded up ten of the scariest tactics cybercriminals use to trick users into clicking on malicious links, open suspicious attachments, install fake software, and more.
This Operation Pawn Storm attack scenario involves the use of phishing emails. See how one line of Javascript code could place millions of Outlook Web Access (OWA) users at risk of becoming victims of a simple, but clever phishing attack.
This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.
Twitter is a very popular online social platform because it's lightweight, easy to use, and widely adopted. Unfortunately these reasons also make it a prime target for abuse. See how this is done, and how to avoid being a victim.
As news about the Ebola pandemic flooded the Internet, cybercriminals and have seized the opportunity to use the popularity of the topic as bait to lure unsuspecting victims to pages that could be used to steal their information and credentials.
If an attacker successfully exploits a vulnerability we found in older versions of Spotify for Android, the attacker can use this vulnerability to phish data. Spotify's prompt action to patch this vulnerability protects its users from this threat.
Popular movies and sporting events are popular bait used by cybercriminals for phishing scams. Learn how you can tell whether a page is a phishing page or not.
Phishing sites, scams, and fake mobile apps - these are some of the cybercriminal schemes Trend Micro researchers found when huge sporting events are underway.