HackDig : Dig high-quality web security articles for hacker

Google adds Anti-Phishing feature also to Gmail app for iOS

To fight phishing attacks, Google has introduced a security measure for its Gmail app for iOS that will help users identify and delete phishing emails. Phishing continues to be one of the most dangerous threats, crooks continue to devise new techniques to trick victims into providing sensitive information. The technique is still the privileged attack vector
Publish At:2017-08-15 15:40 | Read:2555 | Comments:0 | Tags:Breaking News Mobile Security Cybercrime Gmail Gmail app for

Top 10 Email Subjects for Company Phishing Attacks

George is in his office responding to his morning emails when he notices an unusual message. The subject is concise: “Security Alert”. Obviously, he wants to know what’s going on. He opens it, reads the first paragraph to see what the problem is, then clicks the link ostensibly taking him to the company page where he will have to confirm his data
Publish At:2017-08-14 09:20 | Read:1994 | Comments:0 | Tags:Security b2b Phishing

SecurityIQ Product Update: August 2017

This week’s SecurityIQ feature release includes several exciting new capabilities for improved functionality. Updates include data-housing capabilities for European clients, improved reporting tools and simplified language preference management. Read on for complete release details. Download the complete SecurityIQ features overview.Increased Learner-P
Publish At:2017-08-10 01:50 | Read:24507 | Comments:0 | Tags:Phishing Security Awareness

How HTML Attachments and Phishing Are Used In BEC Attacks

Traditionally, BEC attacks have used keyloggers to steal saved account information from target machines. However, using an executable file for the attachment usually flags a user not to click them as there is a high chance that the file is malicious. As a result, we’ve seen a trend wherein the attached files are no longer executable files but HTML pages: Fi
Publish At:2017-07-27 16:35 | Read:3676 | Comments:0 | Tags:Social Targeted Attacks BEC HTML attachments phishing

Protecting your email against phishing attacks

How can you protect yourself against phishing? Email is one of the most popular ways people stay in touch, for both at work and at home. One report found that there were 205 billion emails sent every day in 2015 – and this is expected to rise to 246 billion by 2019. Much of our day-to-day business is conducted online now – take banking for instance. Many ban
Publish At:2017-07-19 18:55 | Read:2085 | Comments:0 | Tags:Mobile News Security cybersecurity Phishing

SMS Phishing induces victims to photograph its own token card

Renato Marinho detailed an unusual SMS phishing campaign that hit Brazilian users. All started with an SMS message supposedly sent from his bank. Introduction Today I faced quite an unusual SMS phishing campaign here in Brazil. A friend of mine received an SMS message supposedly sent from his bank asking him to update his registration data through the given
Publish At:2017-07-17 20:20 | Read:3027 | Comments:0 | Tags:Breaking News Cyber Crime Digital ID Hacking phishing SMS Ph

Did you receive a WhatsApp subscription ending email or text? Watch out!

Did you receive a WhatsApp subscription ending email or text? Watch out! It is a scam to steal your payment and personal data. Researcher Graham Cluley is warning of bogus ‘WhatsApp subscription ending’ emails and texts. Internet users are receiving an email pretending to be from WhatsApp and warning them of the ending for an alleged WhatsApp subscription. A
Publish At:2017-07-17 01:55 | Read:2607 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Cybercrime phishing phshin

Hackshit PhaaS platform, even more easy to power Phishing campaigns

The experts from Netskope Threat Research Labs discovered the Hackshit PhaaS platform, another interesting case of crimeware-as-a-service. A few days ago, we discussed the Katyusha scanner,a powerful and fully automated SQLi vulnerability scanner discovered by researchers at security firm Recorded Future that was available for $500 in the cyber crime undergr
Publish At:2017-07-16 07:30 | Read:3541 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Uncategorized crimeware-as

Outsider or Insider: Who Will Cause Today’s Data Breach?

In today’s cybercrime landscape, threats come not only from all sides, but also from within. In its annual Threat Intelligence Index, IBM X-Force called 2016 the “year of the mega breach.” As threat actors become more sophisticated, enterprises must deal with outsiders who target corporate networks to steal product, client and customer data
Publish At:2017-07-12 10:20 | Read:2856 | Comments:0 | Tags:Data Protection Identity & Access Data Breach Data Breaches

File Sharing Phishing: How you can Protect Yourself

Think before you share.You may be suspicious of the emails you receive in your inbox daily. Sharing photos and videos of friends and family is fun though. So, what are some things you can do to protect yourself while sharing files? Before you easily agree to share files with a friend through a USB drive or online account, make sure your computer’s anti
Publish At:2017-07-07 01:06 | Read:2482 | Comments:0 | Tags:Phishing phishing PhishSim

Amazon Phishing Template: Example and Preventing Attack

What to do if you’ve clicked on an Amazon Phishing EmailAmazon is the world’s largest online retailer and a prominent cloud services provider. Despite being often maligned for its supposed inability to make money compared to tech giants like Google, it still made a $92 million profit in the first quarter of 2017. The company has approximately 66
Publish At:2017-07-06 06:40 | Read:2034 | Comments:0 | Tags:Phishing

What should you be checking in your email messages to prevent an attack by a phishing email?

Phishing emails often look authentic and can trick you into believing they are legitimate. It’s becoming more and more difficult to spot fraudulent emails, which may lead you into clicking on a link to a phony website or point you to a bogus login page, in order to steal your user name and password.One of the most common methods to illicit a response f
Publish At:2017-07-06 06:40 | Read:2269 | Comments:0 | Tags:Phishing

The Enemy Within: Identifying Insider Threats in Your Organization

Security professionals and managers are increasingly concerned that the leading information security risk to organizations comes from within. But despite the sinister overtones of this problem, insider threats are associated more with accidents and oversights than malicious actors. The danger is amplified by shortfalls in training and expertise, and the ch
Publish At:2017-06-22 11:35 | Read:3307 | Comments:0 | Tags:Identity & Access Risk Management Critical Data Data Protect

See Our Threat Analysis of University College London Ransomware Attack

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university data. Credit to UCL for what
Publish At:2017-06-16 17:15 | Read:4370 | Comments:0 | Tags:Breaking News Threats analysis anti-virus browsing cause det

Nigerian phishing: Industrial companies under attack

In late 2016, the Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) reported on phishing attacks that were primarily targeting industrial companies from the metallurgy, electric power, construction, engineering and other sectors. As further research demonstrated, this was just part of a bigger story that began mu
Publish At:2017-06-15 13:30 | Read:7497 | Comments:0 | Tags:Featured Research industrial software Nigerian Scam Phishing


Share high-quality web security related articles with you:)


Tag Cloud