Article Trunk



Posts Tagged ‘phishing’

Hackers are exploiting Zoom’s newfound popularity amid coronavirus pandemic

03.30.2020 · Posted in Technology Articles

With so many people working from home or looking to connect with family and friends amid the coronavirus pandemic, video conferencing platform Zoom is having a big moment. So of course, this makes Zoom a prime target for hackers looking to take advan... ...

Beware of cybercriminals who are taking advantage of coronavirus fears with fake websites and phishing schemes

03.06.2020 · Posted in Technology Articles

The best way to protect yourself is to be wary of lookalike URLs and email addresses, and to not open attachments or download anything from an unfamiliar source. Read more...More about Mashable Video, Cybersecurity, Phishing, Cybercrime, and Coronavirus ...

Cybercriminals are taking advantage of coronavirus fears with fake websites and phishing schemes

03.05.2020 · Posted in Health Articles, Technology Articles

Exploiting a public health crisis for personal gain is the dastardly crime of our times. The research arm of security firm Check Point has found that cybercriminals around the globe have launched phishing and other malware deployment schemes that rid... ...

Most of the largest US voting districts are vulnerable to email spoofing

Only 5% of the largest voting counties in the U.S. are protected against email impersonation and phishing attacks, seen as a key attack method by hackers who officials say want to disrupt the upcoming presidential election. The findings come less than a year before millions of Americans are set to go to the polls to ...

Only a few 2020 US presidential candidates are using a basic email security feature

Just one-third of the 2020 U.S. presidential candidates are using an email security feature that could prevent a similar attack that hobbled the Democrats during the 2016 election. Out of the 21 presidential candidates in the race according to Reuters, only seven Democrats are using and enforcing DMARC, an email security protocol that verifies the ...

Startups face the same phishing risks as big corporations

This week, we reported on TechCrunch how thousands of remote employees with health and workplace benefits through human resources giant TriNet received emails that looked like a near-perfect phishing attempt. One recipient was so skeptical, they shared the email with TechCrunch so we could verify its authenticity. The message checked every suspicious box. In fact, ...

Facebook sues OnlineNIC for domain name fraud associated with malicious activity

Facebook today announced it has filed suit in California against a domain registrar OnlineNIC and its proxy service ID Shield for registering domain names that pretend to be associated with Facebook, like www-facebook-login.com or facebook-mails.com, for example. Facebook says these domains are intentionally designed to mislead and confuse end users, who believe they’re interacting with ...

It’s dismayingly easy to make an app that turns a smart-speaker into a password-stealing listening device and sneak it past the manufacturer’s security checks

German security researchers from Security Research Lab created a suite of apps for Google and Amazon smart speakers that did trivial things for their users, appeared to finish and go dormant, but which actually stayed in listening mode, then phished the user for passwords spoken aloud to exfiltrate to a malicious actor; all their apps ...

Google updates its Titan security keys with USB-C

Google has revealed its latest Titan security key — and it’s now compatible with USB-C devices. The latest Titan key arrives just weeks after its closest market rival Yubico — which also manufactures the Titan security key for Google — released its own USB-C and Lightning compatible key, but almost two years after the release ...

Microsoft says Iranian hackers targeted a 2020 presidential candidate

Microsoft said it has found evidence that hackers associated with Iran have targeted a 2020 presidential candidate. The tech giant’s security and trust chief confirmed the attack in a blog post, but the company would not say which candidate was the target. The threat group, which Microsoft calls Phosphorous — also known as APT 35 ...