phishing

Pierluigi Paganini May 05, 2014
DNS Protocol affected by a serious flaw, Internet users are at risk

Technion students Find a security vulnerability in the Internet DNS protocol which allows the attackers to redirect users to a  website they control. A significant new security vulnerability has been found in the DNS protocol by a group of Israeli students from the Technion’s Department of Computer Sciences. After the Heartbleed case and the assumptions […]

Pierluigi Paganini May 04, 2014
Using lnk file to deceive users in phishing attacks

Expert at Trustwave explained the tactics adopted by cyber criminals how to serve malware in phishing attacks exploiting  .lnk files. Phil Hay, expert at Trustwave SpiderLab, explained how cyber criminals  are using .lnk files to serve malware via email. I have chosen to detail this tactic to demonstrate how much creative is the criminal ecosystem, even if it […]

Pierluigi Paganini May 02, 2014
Vishing is still alive and a malicious campaign is scaring banking

Security Experts at PhishLabs revealed that a vishing campaign targeted banking industry to harvest credit/debit card data from customers. The security firm PhishLabs revealed that numerous US banks are victims of a recent Vishing (VoIP-based phishing) campaign that is targeting the payment card information of up to 250 Americans per day. Assuming that the withdrawal limits on ATM […]

Pierluigi Paganini April 30, 2014
AOL suffered a massive Data Breach

AOL Inc. confirms security breach, email accounts of a significant number users may have been exposed, no financial data has been stolen. AOL Inc. last Monday has confirmed with an official  blog post that the company suffered a massive data breach which may have compromised the email accounts of a significant number users, for this reason it is suggested to the clients of […]

Pierluigi Paganini April 29, 2014
Evolution of the Russian underground offer

TrendMicro has published an excellent study on the evolution of the Russian underground, detailing products, services and related prices. Max Goncharov has published a new interesting study on the Russian Underground, titled Russian Underground Revisited, one year after the previous report “Russian Underground 101”. Trend Micro report continues its analysis of the services and products offered by cyber criminals in […]

Pierluigi Paganini April 28, 2014
FakeInst – Kaspersky discovered the first active Android SMS trojan

Kaspersky Lab has recently detected FakeInst, the first active SMS trojan for Android which targeted users in 66 countries, including the US. Security experts at Kaspersky Lab have recently detected the first active SMS trojan for Android, which send short messages to premium-rate numbers in 14 countries around the world. The malware, dubbed ‘Trojan-SMS.AndroidOS.FakeInst.ef‘ (aka FakeInst) mainly infected mobile […]

Pierluigi Paganini April 15, 2014
APWG report 2H2013- Analysis of phishing phenomena on global scale

The APWG report 2H2013 seeks to understand trends and their significance by quantifying the scope of the global phishing problem. Last Anti-Phishing Working Group APWG report titled “Global Phishing Survey: Trends and Domain Name Use in 2H2013” confirms that threat of phishing has never been so high, the number of domains registered to conduct this kind of […]

Pierluigi Paganini April 11, 2014
Reading the Mandiant M-Trends 2014 Threat Report

Mandiant has released its annual M-Trends 2014 Threat Report, a document that analyzes actors, means and motivations behind attacks observed in 2013. Mandiant FireEye company has released a new detailed report titled “M-Trends 2014 Threat Report” describing actors, means and tactics behind principal attacks conducted in the recent months. The report consolidated data on principal cyber […]

Pierluigi Paganini April 08, 2014
Symantec on a fake voting campaign used to steal Facebook credentials

Security experts at Symantec observed a new phishing campaign based on a fake voting application used to steal victim’s credentials. Phishing is a very dangerous threat for Internet users, nearby classic techniques new forms of phishing are exploiting new platforms like mobile and social networks. Phishers continuously improve their techniques to be able to harvest […]

Pierluigi Paganini April 03, 2014
Security threat landscape in the Middle East … the mined cyber area

Analysis of the cyber threat landscape in the Middle East region provided by Tim Rains, director of Trustworthy Computing at Microsoft, at RSA 2014. Middle East is historically a critical area for the diplomacy, but there is the same critical under the cyber security profile. The governments, the enterprises and the organizations present in the […]