Social Engineering

Social Engineering

Privacy Policies: The Realm Of The Legible Word Salad by Chris Boyd

Exploring the virtual worlds of advergaming

With a spot of tracking-related controversy ruffling feathers in gaming circles, now is a good time to become familiar with some of the advertising methods used for, and in, video games. Ladies ...
Fake Malwarebytes helpline scammer caught in the act

Fake Malwarebytes helpline scammer caught in the act

In this blog, we take you through a phone call to a fake Malwarebytes helpline run by Blue Eye Ventures, and show you how to spot the scam in action. Categories: Cybercrime ...
Vendors, Educating, and Social Media Marketing

Vendors, Educating, and Social Media Marketing

What do professionals inadvertently disclose about the operations security (OPSEC) of their organizations and themselves while giving advice? Becoming a known educator and voice in your area of expertise is effectively done ...
Further sharing of signals across the Intelligent Security Graph

Enhancing Office 365 Advanced Threat Protection with detonation-based heuristics and machine learning

Email, coupled with reliable social engineering techniques, continues to be one of the primary entry points for credential phishing, targeted attacks, and commodity malware like ransomware and, increasingly in the last few ...
Netflix phish claims your membership is on hold

Netflix phish claims your membership is on hold

We take a look at a new Netflix phish in circulation, using the time-honored trick of claiming the recipient is about to lose access unless they hand over some personal information. Categories: ...
Shoppers Stop tech scam draws from thousands of forced ad injections

Shoppers Stop tech scam draws from thousands of forced ad injections

The same group behind the Shoppers Stop tech scam campaign is at it again, injecting malicious ad code into thousands of sites and redirecting to a templated warning page. Categories: Social engineering ...
Far Cry 5 download offers: embrace the power of “no”

Far Cry 5 download offers: embrace the power of “no”

It seems opportunists are jumping on popular video game Far Cry 5's bandwagon, with a flood of promises for free game downloads. We take a look at a return to form for ...
8 Tips for a Secure and Frictionless Mobile First Strategy

8 Tips for a Secure and Frictionless Mobile First Strategy

This blog is based on an article authored by David Vergara, Director of Security Product Marketing, VASCO, that first appeared 2/21/2018 in Credit Union Times. As part of a secure and seamless ...
Sophistication in Hackers

Barracuda Networks Rethinks Cybersecurity Training for Users

Barracuda Networks, following its acquisition of PhishLine, wants to encourage companies to take a more positive approach to cybersecurity training, helping users how to better recognize spear-phishing attempts along with other forms ...
Security Boulevard
Loading...