scareware

4 Phishing Attacks that Exploit Two-Factor Authentication (2FA)
Lisa O'Reilly | | 2FA solution, malicious browser extensions, man in the browser attacks, Phishing, Phishing Attacks, phishing threat intelligence, phishing threats, real time phishing threat intelligence, scareware, social engineering attacks, technical support scams, two factor authentication
Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we ... The post 4 Phishing Attacks that Exploit Two-Factor Authentication (2FA) appeared first on SlashNext ...

Prison for man who assisted scareware scheme that targeted newspaper website
A man wanted for his part in a lucrative criminal operation that spread scareware via the Minnesota Star Tribune website, who spent years on the run from the FBI, has finally been ...

Big Time Crooks
When an online scam becomes too successful, the results can be farcical. In the movie Small Time Crooks, Woody Allen leads an inept gang of would-be robbers who rent a store next ...

Fancy Bear Cyberspies Hide Phishing Pages Behind Blogspot Links
Lucian Constantin | | APT28, banking trojan, black hat SEO, blogspot, cyberespionage, DNC hack, fake AV, Fancy Bear, Hacking, Pawn Storm, Phishing, scareware, search engine optimization, Sofacy, zeus
Security researchers have identified a new phishing campaign launched by Russian cyberespionage group Fancy Bear that uses rogue blogspot.com URLs to bypass spam filters. These latest attacks were aimed at Bellingcat, a ...