™

4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)

Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we ... The post 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA) appeared first on SlashNext ...
Prison for man who assisted scareware scheme that targeted newspaper website

Prison for man who assisted scareware scheme that targeted newspaper website

A man wanted for his part in a lucrative criminal operation that spread scareware via the Minnesota Star Tribune website, who spent years on the run from the FBI, has finally been ...
Big Time Crooks

Big Time Crooks

When an online scam becomes too successful, the results can be farcical. In the movie Small Time Crooks, Woody Allen leads an inept gang of would-be robbers who rent a store next ...
Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links

Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links

Security researchers have identified a new phishing campaign launched by Russian cyberespionage group Fancy Bear that uses rogue blogspot.com URLs to bypass spam filters. These latest attacks were aimed at Bellingcat, a ...