Categories

Cybercrime Victimization Rates Vary Between 1 And 17 Percent

By Admin on 08/20/2013 2:22 AM
The United Nations Office on Drugs and Crime was tasked with conducting a comprehensive study of the problem of cybercrime. The study, Comprehensive Study on Cybercrime, was conducted from February 2012 to July 2012, with information received from 69 member states. The study covered eight topics, organized into chapters: (1) Connectivity and cybercrime; (2) The global picture; (3) Legislati...
Read More

Are We Entering The Fourth Great Era Of Digital Crime?

By Admin on 08/13/2013 2:24 AM
BAE Systems Detica commissioned a report, Organized Crime In The Digital Age, by the John Grieve Centre for Policing and Security at London Metropolitan University to look in detail at the structure of organized digital crime groups, how they are using information and communications technology to perpetrate their crimes, and how these new threats can be tackled. As the report indicate, digi...
Read More

Cisco Research On Targeted Phishing Attacks

By Admin on 07/23/2013 2:44 AM
Cisco research on targeted phishing attacks explains why email remains the primary attack vector for cyber criminals. The research from Cisco points out, cybercriminal business models have shifted toward low-volume targeted attacks. The report, Email Attacks – This Time Its Personal, documents that email remains the primary attack vector, the annualized cybercrime business activity c...
Read More

Survey of IT Professionals Social Engineering Risks

By Admin on 07/23/2013 2:43 AM
In 2011, Dimensional Research and Check Point conducted a survey of IT Professionals on The Risk Of Social Engineering On Information Security. The report provides some key insights into security professionals concerns related to social engineering risks and what they are doing about such threats. The report was based on a global survey of 853 IT professionals conducted in the United Sta...
Read More

Summary of The Kaspersky Report On The Evolution of Phishing Attacks

By Admin on 07/18/2013 2:45 AM
The report from Kaspersky Labs is on the evolution of phishing attacks from 2011-2013. The information was collected from the Kaspersky Security Network cloud service used to gain a better understanding of the global landscape of phishing threats from a variety of angles. It is important to note that this study addressed only attacks that were intercepted using heuristic security technologies bu...
Read More

Spear-Phishing and Advanced Persistent Threat Campaigns

By Admin on 07/08/2013 9:15 AM
Spear-phishing is the most prevalent delivery method for advanced persistent threat (APT) attacks. Today’s cyber criminals launch APT attacks with sophisticated malware and sustained, multi-vector and multi-stage campaigns to achieve a particular objective. In a typical spear-phishing attack, a specially crafted email is sent to specific individuals from a target organization. “APT cam...
Read More

Symantec Internet Security Threat Report: Social Engineering Facts

By Admin on 06/04/2013 2:54 AM
The Symantec Internet Security Threat Report includes vast information on security related issues, including social engineering facts.  Spam, phishing, and malware data is captured through a variety of sources.  These resources give Symantec’s analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in att...
Read More

Gartner Survey On The Cost of Phishing Attacks

By Admin on 05/28/2013 2:57 AM
Although a few years old, a survey from Gartner shows the cost of phishing attacks. The threat to business and consumers is substantial.  Since the survey was completed, there has been no let up on the volume of social engineering attacks, including phishing.  As RSA pointed out earlier this year there was a 59 percent increase in phishing attacks from 2011 to 2012.  As such,...
Read More

Symantec Security Report Turns Conventional Wisdom Upside Down

By Admin on 04/23/2013 7:02 AM
Symantec security report turns conventional wisdom upside down.  Small businesses thought they were immune from social engineering attacks. Not so. It is understandable for many small businesses to consider themselves relatively immune from highly complex and sophisticated malware, phishing, and social engineering attacks.  After all, the logic goes, the bad guys are after the &ldqu...
Read More

RSA Phishing Report For 2012

By Admin on 04/22/2013 3:04 AM
RSA, a division of EMC, publishes a monthly report details statistics related to online fraud. The January 2013 report, The Year In Phishing, includes summary data on phishing attacks for 2012. The RSA phishing report for 2012 findings demonstrate that phishing and other social engineering tactics remain a significant concern for business and security professionals. Some of the key findings incl...
Read More

Types Of Phishing Defined

By Admin on 04/16/2013 2:23 AM
The types of phishing are defined in this post. This list defines phishing, spear-phishing, clone phishing, and whaling. If you’re reading this blog you probably already know a good bit about security. But for those of you who are just getting started in this field, or those who want to learn a little more about the types of phishing, we’ve pulled to a list of some of the various ...
Read More

Symantec Addresses New and Unique Facebook-Specific Attacks

By Admin on 04/08/2013 10:27 PM
Symantec addresses new and unique Facebook-specific attacks. A typical characteristic of phishing attacks is their ability to adapt with the times. With the rise of social media, the bad guys have found seemingly infinite opportunities to scam unsuspecting users. After all, social media is predicated on the unfiltered exchange of information; would-be victims are easy targets given how accustome...
Read More

Phishing Attacks Primary Target May Surprise You

By Admin on 04/02/2013 2:33 AM
Kaspersky Lab, a provider of antivirus and Internet security software, recently published its review of e-mail spam malicious attacks across 2012.  The results are a classic mix of good news and bad news. First, the good news.  The amount of e-mail spam fell throughout the course of the year.  By the end of the year, the average amount of spam in email stood at 72.1 percen...
Read More

Social Engineering Attack Prevention and Mitigation

By Admin on 03/26/2013 2:41 AM
When Microsoft security experts offer advice, organizations should listen, particularly with regards to social engineering attacks. Microsoft has provided insight into social engineering attack prevention and mitigation. Social engineering attacks are becoming increasingly sophisticated, and as a result, far more difficult to control since the attackers generally prey on the human element rat...
Read More

On-site or Offsite Social Engineering Testing

By Admin on 02/20/2012 11:43 PM
Should we perform on-site or offsite social engineering? Although there is value in onsite social engineering, for the money offsite social engineering, such as that provided by PhishingBox is much more cost effective. Only in rare circumstances, will attackers attempt anything that require their physical presence. As such, most organizations do not need onsite testing. According to a rece...
Read More

Password Weaknesses Are Exploited By Social Engineering

By Admin on 02/19/2012 11:45 PM
Password weaknesses can be exploited. Today, users are susceptible to social engineering because they access more web-based systems. With the increased adoption of cloud computing, users are logging into more internet-based systems. How can your company reduce risk to social engineering? The FFIEC states, “Controls against these attacks [social engineering] involve strong identification po...
Read More