Search Results for: phishing
The Art of Social Engineering
Years ago, at a company I used to work for, a large group of employees, myself included, were the target of a spam email that had been deliberately sent through the corporate network and encouraged us to click on a …
Generating False Hope with Fake Generators
Another day, another random website offering up freebies that you’d be better off without. This time around, the site in question is located at freeamazingsoftwares(dot)blogspot(dot)com. The free programs include – stop me if you’ve heard this one – RuneScape gold …
Understanding Website Categorization in GFI WebMonitor
GFI WebMonitor is robust web filtering, web monitoring and web security solution, that provides administrators with more than 70 categories of websites from which to choose and provide granular flexibility when applying policies. However, how many of us really understand …
Facebook Profile Rollback Phish
Here’s a phishing scam that lures users with the promise of getting their “old Facebook profile” back. What that means is up for debate – maybe the scammer is harking back to a land of slightly less privacy options, or …
Here’s another thing that’s scary about Shady RAT
A lot of chatter and breathless reporting about Shady RAT. All the makings of an epically awesome story — the US is being taken down by Chinese interlopers to the nastiest degree, installing keyloggers and other badness on US government …
We’re (Auto)whalers on the Moon
I don’t know what it is about this one that sets the Spidey Sense tingling. Maybe it’s the fact it promises to make things all too easy – Vader reference there for anyone keeping score – for the lazy crook. …
When Fans Attack, Facebook Phish and Steamy Logins
Here’s a roundup post with some snippets from the past day or two along with one or two events you may have missed. Last week, you could (in theory) been searching for the country singer Katie Armiger. No, I have …
Google docs phishing
A hazard of cloud-based services is reputation hijacking — using the cover of a legitimate cloud service to do bad things. For example, you can’t block the domain “Google.com”, because it has legitimate purposes. So a network administrator is left …
Thousands of Tumblr Logins Stolen in Phishing Attack
The past few days have seen a rather aggressive phish attack targeting users of popular Microblogging service Tumblr. What started off as a strange (if rather basic) “click the link to see an advert” scam has now become a phishing problem so …
More Phishy Tumblr Fun
Hey look, I have a new follower on Tumblr! I can’t wait to see all their lolcats, spinny gifs and pictures of Batman. Let’s click the link and see what they have for me this ti- Click to Enlarge ….oh. …









