- Clickjacking – In traditional click-jacking, a malicious email link actually direct you to a malicious or impostor site. A new version places something that looks like a dirt spot or hair on the web page and when the user tries to ...
Troy Hunt, of HaveIBeenPwned fame, on January 17 reported what may be the biggest data breach ever. Collection #1 is a set of email addresses and passwords totalling 2,692,818,238 rows. That’s right, 2.6 billion rows. 773 million records, from over 12,000 files, with a total size surpassing 87 gigabytes. That’s a lot of personally identifiable information ...Continue Reading →
Your phone may be ringing soon with a fraudulent call from the “Social Security Administration” about problems with your social security number. The Federal Trade Commission is warning consumers about this fraud. A transcript of a typical call is below.
“…law enforcement agencies to suspend your Social Security number on an immediate basis, as we have received suspicious trails of information in your name. ...Continue Reading →
You know those surveys, games, and “like and copy” messages that your Facebook “friends” share with you? Would you be surprised to learn that many of these “fun with friends” activities are just cover for a new form of phishing exploit? In the last few years phishing attacks have evolved from a primarily email-based attack into attacks using other vectors including surveys, games, gifts and prizes, and social networks.
Every year about this time, cyber-criminal groups start to ramp up for the annual income tax fraud season. If you would prefer to receive your own tax refund, as opposed to letting some scam artist get it instead, the basic solution is to file your returns as early as possible. Here are some things to be watching for.
It can be overwhelming to learn you’ve been a victim of identity theft. As in your case, crimes involving identity theft and credit fraud are often committed online.
There are other options for photo sharing ...Continue Reading →
Are you wondering what exploits represent the biggest threats in 2019? It can be difficult and expensive to defend against everything. If your company is budget-constrained, it may make more sense to defend against what is “likely” instead of everything that is “possible.” Today we look at some of the biggest cyber-attack methods from the past, the present and the future.
While these threats ...Continue Reading →
This entry was posted in Research, Wordfence, WordPress Security on December 5, 2018
The Defiant Threat Intelligence team recently began tracking the behavior of an organized brute force attack campaign against WordPress sites. This campaign has created a botnet of infected WordPress websites to perform its attacks, which ...Continue Reading →
You think you are the clever one because you never use the Internet for online banking, online shopping, or managing accounts like your retirement account, gas and electric utilities, telephone, cell phone, and Internet. Open a Facebook account? Never! You think you are safer from account hijacking and identity theft because you never set up any online accounts. If you don’t have it, they can’t hack it – right? Wrong!
If you ...Continue Reading →
08/10/2018 08:25 AM EDT
Original release date: August 10, 2018
As summer break ends, many students will return to school with mobile devices, such as smart phones, tablets, and laptops. Although these devices can help students with their schoolwork and stay in touch with family and friends, there are risks associated with using them. However, there ...Continue Reading →