Hackers are sidestepping automated protection engineering and therefore are using interpersonal engineering and details mining to orchestrate attacks against well known people today and their business networks.
He claims to be 21 years old, a student of software engineering in Tehran who reveres Ayatollah Ali Khamenei and despises dissidents in his country.
A family member recently asked me some questions about how to keep his Google account secure, and I wrote up a bunch of recommendations for how to stay safe.
When you hear about a phishing attack on e-mail accounts, it’s easy to assume that the victim was just too gullible. But as recent attacks on Gmail, Hotmail and Yahoo Mail have demonstrated, the old rule of “don’t open attachments or click links from untrusted sources” isn’t always enough to fend off a targeted phishing attempt.
The username/password approach to security on the Web is woefully insecure and in need of updating. Passwords are breached (hello, Gawker), email addresses are stolen (hello, Epsilon), phishing attacks tend to hook the unwary, and then identities are stolen.
News of an Iranian hacker duping certification authority Comodo into issuing digital certificates to one or more unauthorized parties has caused an uproar in the IT community, moving some critics to call for Microsoft and Mozilla to remove Comodo as a trusted root certification authority from the systems under their control.
Nearly 40% of UK small and medium enterprizes (SMEs) have been hit by malware attack, yet many are still making basic mistakes that put them at risk, a study has revealed.
Imagine you’re spending a lazy Sunday afternoon at home just chilling, updating your blog with photos of the new bike you just bought, chatting on Facebook as you do so.
There are no surprises in how the attacks where carried out, but we can draw many morals from the story, even if we’ve heard them time and time before.