HackDig : Dig high-quality web security articles for hacker

Fake Elder Scrolls Online developers go phishing on PlayStation

A player of popular gaming title Elder Scrolls Online recently took to Reddit to warn users of a phish via Playstation messaging. This particular phishing attempt is notable for ramping up the pressure on recipients—a classic social engineering technique taken to the extreme. A terms of service violation? In MMORPG land, the scammers take a theoretically pla
Publish At:2019-12-06 16:50 | Read:282 | Comments:0 | Tags:Social engineering elder scrolls online ESO gamers gaming ga

Corporate security prediction 2020

Kaspersky Security Bulletin 2019. Advanced threat predictions for 2020 Cybersecurity of connected healthcare 2020: Overview and predictions 5G technology predictions 2020 Cyberthreats to financial institutions 2020: Overview and predictions Moving to the cloud The popularity of cloud services is growing, and threat actors are here to exploit the trend. We
Publish At:2019-12-03 06:05 | Read:180 | Comments:0 | Tags:Kaspersky Security Bulletin Cloud Computing Cyber espionage

Sextortion scammers getting creative

We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of the scam grow
Publish At:2019-11-26 16:50 | Read:306 | Comments:0 | Tags:Cybercrime Social engineering bitcoin scam sextortion scams

Spam and phishing in Q3 2019

Quarterly highlights Amazon Prime In Q3, we registered numerous scam mailings related to Amazon Prime. Most of the phishing emails with a link to a fake Amazon login page offered new prices or rewards for buying things, or reported problems with membership, etc. Against the backdrop of September’s Prime Day sale, such messages were plausible. Scammers
Publish At:2019-11-26 06:05 | Read:248 | Comments:0 | Tags:Featured Spam and phishing reports Malicious spam Malware De

Unwanted notifications in browser

When, back in 2015, push notifications were just appearing in browsers, very few people wondered how this tool would be used in the future: once a useful technology made to keep regular readers informed about updates, today it is often used to shell website visitors with unsolicited ads. To achieve that, users are hoaxed into subscribing to notifications, fo
Publish At:2019-11-25 13:05 | Read:263 | Comments:0 | Tags:Featured Research Browser Phishing Social Engineering

Black Friday Alert 2019: Net Shopping Bag of Threats

Every year, Kaspersky releases an annual Black Friday alert to highlight how fraudsters may capitalize on increased levels of online shopping at this time of year when many brands are offering their customers appealing discounts. In the rush to get a big discount or, even more panic-inducing, a limited time offer, many shoppers lose all sense of vigilance. C
Publish At:2019-11-22 18:05 | Read:174 | Comments:0 | Tags:Publications Electronic Payments Malware Statistics Phishing

Deepfakes and LinkedIn: malign interference campaigns

Deepfakes haven’t quite lost the power to surprise, but given their wholesale media saturation in the last year or so, there’s a sneaking suspicion in some quarters that they may have missed the bus. When people throw a fake Boris Johnson or Jeremy Corbyn online these days, the response seems to be fairly split between “Wow, that’s funny” and barely ev
Publish At:2019-11-20 16:50 | Read:236 | Comments:0 | Tags:Social engineering AI computer generated deepfakes fakes kat

Help prevent disaster donation scams from causing more misery

It’s a sad day when we have to warn people about medical charity scams, or tax fakeouts, or even have a week dedicated to foiling charity fraud—but here we are. With so many natural disasters occurring, from wildfires in California to tornadoes in Dallas, disaster donation scams remain a top resource for scammers looking for free cash. Unfortunately, disaste
Publish At:2019-11-11 23:20 | Read:237 | Comments:0 | Tags:Social engineering 419 419 scams charity cold call scams col

Not us, YOU: vendor email compromise explained

Silent Starling, an online organized criminal group hailing from West Africa, seem to have reminded SMBs and enterprises alike the perils of business email compromise (BEC) scams once more. This time, they’ve advanced BEC into a more potent modality by widening the scope of its potential targets and methodically preparing for the attack from timing to
Publish At:2019-11-11 23:20 | Read:118 | Comments:0 | Tags:Business account takeover ACID Agari Agari Cyber Intelligenc

Steam-powered scammers

Digital game distribution services have not only simplified the sale of games themselves, but provided developers with additional monetization levers. For example, in-game items, such as skins, equipment, and other character-enhancing elements as well as those that help one show up, can be sold for real money. Users themselves can also sell items to each oth
Publish At:2019-10-28 06:05 | Read:293 | Comments:0 | Tags:Featured Research Fraud gam Phishing websites Social Enginee

How to protect yourself from doxing

“Abandon hope all ye who enter.” This ominous inscription affixed atop the gates to Hell in Dante’s Divine Comedy applies peculiarly well to describe the state of the Internet today. It’s hard to draw a parallel to the utility that the Internet has offered to modern civilization—perhaps no other technological innovation has brought about greater chan
Publish At:2019-10-25 16:50 | Read:347 | Comments:0 | Tags:How-tos dox doxer doxing IP address mobile VPNs online priva

How to Tell Safe Advertisements From Dangerous Malvertising

Advertising is the life blood of the internet. Some of the world’s biggest and most influential tech companies earn a large chunk of their revenue through harmless and safe advertisements, but some of the most successful cybercriminals also rely on advertising. When good ad networks are tricked into delivering malware, it’s known as malvertising.
Publish At:2019-10-18 10:20 | Read:255 | Comments:0 | Tags:Endpoint Fraud Protection Adware Artificial Intelligence (AI

Instagram clamps down on fake messages with anti-phishing tool

Instagram accounts will always be a popular target for scammers. You might not think it’s a big deal if someone has their account swiped, but it’s often the vanguard of many online businesses. A takeover, or a deletion, can be absolutely devastating. Smart hacking crews are always in the background, waiting to see what they can get away with—and it’s not jus
Publish At:2019-10-15 23:20 | Read:249 | Comments:0 | Tags:Social engineering anti-phishing anti-phishing tool email em

A glimpse into the present state of security in robotics

 Download full report (PDF) The world of today continues its progress toward higher digitalization and mobility. From developments in the Internet of Things (IoT) through augmented reality to Industry 4.0, whichrely on stronger automation and use of robots, all of these bring more efficiency to production processes and improves user experience across th
Publish At:2019-10-14 06:20 | Read:410 | Comments:0 | Tags:Featured Publications Internet of Things Security technology

Brain-hacking: Why Social Engineering is so effective

<p>You are affected by social engineering tactics every day.</p> <p><img src="https://info.phishlabs.com/hs-fs/hubfs/brain%20hacking.png?width=300&amp;name=brain%20hacking.png" alt="brain hacking" width="300" style="width: 300px; float: right; margin: 0px 10px 10px 0px;">Okay, let me explain. From an information security standp
Publish At:2019-09-19 22:40 | Read:159 | Comments:0 | Tags:Psychology social engineering

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud