- Welcome Guest
- Sign In
Defenders of software supply chains have a new attack vector to worry about: machine learning models
Although small businesses lack the resources large enterprises enjoy to defend themselves online, SMBs can avoid becoming cybercrime victims by following these proven, safe computing practices
Streaming video content from non-mainstream providers might make you an unwitting target of content piracy. If you get a bargain pricing offer, you risk becoming the victim of scammers and hackers, losing personal data, and having your financial assets stolen
Compromised credentials provide an easy way for threat actors to get their hands on valuable data possessed by governments. Phishing attacks on civil servants jumped 30% from 2020 to 2021, with one out of every eight workers exposed to phishing threats during the period
A large-scale phishing attack built on typosquatting is targeting Windows and Android users with malware. The campaign currently underway uses more than 200 typosquatting domains that impersonate 27 brands to trick web surfers into downloading malicious software to their computers and phones.
A recent report highlights the staggering growth of ATO fraud online. In the U.S. alone, around 24 million households have fallen victim to this form of fraud. Social media is one of the driving forces behind the issue, with more than half of all ATOs related to a social media account.
The Trend Micro report cited, as an example, the #EyeMakeup hashtag on Instagram, which has nearly 10 million posts, and #EyeChallenge on TikTok, with more than two billion views, exposing iris patterns good enough to pass iris scanners
Officials charged Joseph Sullivan with working to hide the data breach from U.S. regulators and the Federal Trade Commission, adding his actions attempted to prevent the hackers from being caught
In a survey of consumers, the Identity Theft Resource Center found that 85% had their Instagram accounts compromised, while 25% had their Facebook account hijacked
Phishing links produced by EvilProxy lead to cloned web pages crafted to compromise accounts associated with a number of reputable services, including Apple iCloud, Facebook, GoDaddy, and others
The threat actors would frequently pose as an employee of the fictional media publication “Australian Morning News” and provide a URL to their malicious domain. If a target clicked the URL, they’d be sent to the fake news site and be served up the ScanBox malware.
Keeping safe in cyberspace is increasingly difficult as crooks try to exploit uninformed users every chance they get. Add to that, virus and malware threats are never-ending. Here are five things in your control to help keep your digital activity safe
Nearly all the top 10 universities in the United States, United Kingdom, and Australia are putting their students, faculty and staff at risk of email compromise by failing to block attackers from spoofing the schools’ email domains
Be suspicious at the first sign of your phone behaving oddly. Both the Android and iOS smartphone platforms present the same set of common symptoms to indicate malware may be at play inside your device.