Entries by fdesir

Oxford University blocks Google Docs because of phishing attacks.. for 2.5 hours

An article on  phishing in google doc’s from Naked security:  Earlier this week it was being widely reported that Oxford University had taken the drastic step of completely blocking Google Docs, after it had seen a dramatic increase in the number of phishing attacks exploiting the service, targeting staff and students. What wasn’t so widely […]

Cloud Security Measures Too Opaque For Customers

An   new article on cloud security  from Dark Reading:  The apparent cost benefits and flexibility of cloud services may have convinced companies’ front offices to dive into the cloud, but convincing corporate security teams is another matter. Nearly seven out of eight information-technology professionals do not trust cloud providers to protect their companies’ most sensitive […]

Jeep joins Burger King in Twitter hack club

A new article from NBC News technology section on twitter accounts being hack:   Just a day after Burger King’s Twitter account was hacked and renamed McDonalds, Jeep is suffering the same fate — but the takeover hoax isn’t credited to the fast food empire this time. Jeep’s hacked account says it’s been bought by […]

Apple’s own Macs bitten by Java-based malware attack

An article form naked Securty about malware  on Mac:   If you still think malware on a Mac is more myth than reality you may want to talk to the security engineers over in Cupertino at a rather prestigious fruit company. According to Reuters, “Apple Inc. was recently attacked by hackers who infected the Macintosh […]

Spearphishing: The dirty email trick favored by the nastiest hackers

Interesting article in  NBC NEWS technology  section: A new report says that the Chinese military is secretly obtaining sensitive data from U.S. companies. A key technique is “spearphishing,” an approach that tricks a targeted individual to reveal information that can be used to infiltrate the company or government agency that person works for. Security companies […]

Chinese Army Unit Is Seen as Tied to Hacking Against U.S.

Interesting article for the New York Times  technology section: On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyberwarriors. The building off Datong Road, surrounded by restaurants, massage parlors and a wine importer, is the headquarters of P.L.A. […]

Spear Phishing: A Quick Review

Spear Phishing is very common to the traditional Phishing but more targeted to a specific group. Spear Phishing is define as an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Spear Phishing attempts are not typically initiated by “random hackers” but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information (SearchSecurity, 2005).

Avoiding Phishing

Phishing is defined as the practice of using fraudulent e-mails and fake duplications of legitimate websites to extract financial data from computer users for purposes of identity theft.