scareware
Exposing a Portfolio of Pay Per Install Rogue and Fraudulent and Malicious Affiliate Network Domains – An OSINT Analysis
Dear blog readers,I've decided to share with everyone an in-depth historical OSINT analysis on some of the primary pay per install rogue fraudulent and malicious affiliate network based rogue and fraudulent revenue ...
4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)
Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we ... The post 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA) appeared first on SlashNext ...
Prison for man who assisted scareware scheme that targeted newspaper website
A man wanted for his part in a lucrative criminal operation that spread scareware via the Minnesota Star Tribune website, who spent years on the run from the FBI, has finally been ...
Big Time Crooks
When an online scam becomes too successful, the results can be farcical. In the movie Small Time Crooks, Woody Allen leads an inept gang of would-be robbers who rent a store next ...
Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links
Security researchers have identified a new phishing campaign launched by Russian cyberespionage group Fancy Bear that uses rogue blogspot.com URLs to bypass spam filters. These latest attacks were aimed at Bellingcat, a ...