Facebook phishers want you to “Connect with Facebook”

Facebook phishers link from bogus landing pages hosted on sites(dot)google(dot)com URLs. What do they want? Your data.
Categories:

Cybercrime
Social engineering

Tags: facebookFacebook phishersfakeGooglephishphishing

(Read more…)

The … Continue reading Facebook phishers want you to “Connect with Facebook”

There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market

The digital world of Bitcoin is ablaze with profit, speculation, and potential riches for all – unfortunately, scammers are in on the action and will stop at nothing to relieve the unwary of their digital fortunes. From the oldest tricks in the bo… Continue reading There’s a hole in my bucket: Bitcoin scams aim to exploit volatile market

A Quarter of Phishing Attacks are Now Hosted on HTTPS Domains: Why?

The push for more widespread adoption of HTTPS has been in full-force this year as a way to increase the number of websites that securely transmit information on the Internet. In January, both Chrome and Firefox browsers began alerting users whene… Continue reading A Quarter of Phishing Attacks are Now Hosted on HTTPS Domains: Why?

PayPal phish asks to verify transactions—don’t do it

We take a look at a batch of fake PayPal emails asking potential victims to visit a so-called resolution center to address unverified transactions.
Categories:

Cybercrime
Social engineering

Tags: emailfakemailPayPalphishphishingscam

(Read mo… Continue reading PayPal phish asks to verify transactions—don’t do it

A week in security (November 13 – November 19)

Learn what happened in the world of security during the week of November 13 – November 19.
Categories:

Security world
Week in security

Tags: camcatphishingcyber mondayemailfraudGoogle Playmalwarephishweek in securityweekly roundup

(Rea… Continue reading A week in security (November 13 – November 19)

Enterprise Credential Theft: How to Spot a Phish

Today, we are going to look at a phish that takes advantage of the massive user base of Office 365 products. It’s safe to speculate that this phish is specifically targeting enterprise employees given most users of Office 365 products are using it for business purposes.

The post Enterprise Credential Theft: How to Spot a Phish appeared first on Security Boulevard.

Continue reading Enterprise Credential Theft: How to Spot a Phish

419 scammer offers USD $60 million—and a free child

419 scammers offering up untold riches are nothing new. But untold riches and an adopted child for good measure? How could we not explore this one further?

Categories:

Tags:

(Read more…)

The post 419 scammer offers USD $60 million—and a free child appeared first on Malwarebytes Labs.

The post 419 scammer offers USD $60 million—and a free child appeared first on Security Boulevard.

Continue reading 419 scammer offers USD $60 million—and a free child