Quantcast
Channel: Phishing As An Attack Vector – InfoSec Resources
Browsing latest articles
Browse All 20 View Live

The End of Bitcoin Ransomware?

Section 1. Introduction Bitcoin, a virtual currency generated through peer-to-peer technology and not controlled by any central authority, is used not only for paying for goods and services, but also...

View Article



An Overview of the Payment Card Industry (PCI)

The payment card industry consists of all the organizations which store, process and transmit cardholder data and carry transactions through debit and credit cards. Many standards are developed to...

View Article

All About Carding (For Noobs Only)

Disclaimer: The Article writer’s intent is to spread awareness about the carding. The writer is not responsible if any damage occurs. This is for educational purpose only. Hello Guys, if you were a...

View Article

Latest Trends in Cybersquatting

Section 1. Introduction Protecting company’s intellectual property, including designs, patents, trade names, and domain names, is an essential condition for establishing a successful business. The...

View Article

New Born Macro Malware Dropping Rootkits Using a Fileless Infection Vector

Getting Serious While Shamoon still shrieks “I am back” all over GCC countries, a completely new “bad boy” spam hits the servers. This VBScript malware document seems to be newborn or revamped, had no...

View Article


Insurance Against Ransomware Threats

Section 1. Introduction Although there is a vast amount of information on the risks of cyber-attacks, not all businesses engage in preparation and implementation of comprehensive cyber risk management...

View Article

Exclusive – A Close Look at the Largest Credential Harvesting Campaign Via an...

Exclusive: MalwareMustDie discovered a criminal gang that is using SSH TCP direct forward attack technique in a large-scale operation. The popular researcher MalwareMustDie published his first analysis...

View Article

More PowerShell Remoting Artifacts

In Part 1 of this series, we looked at PowerShell remoting artifacts under various Event IDs and ways to gather more information from those events and relate it to the investigation context. In this...

View Article


A4 Black Friday: Massive Ransomware Attack Leveraging on Wannacry Hit Systems...

WannaCry ransomware hit Windows computers worldwide A massive malicious ransomware-based attack made the headlines on Friday, first targeting UK hospitals and Spanish banks before rapidly spreading...

View Article


Why Was Wanacrypt0r 2.0 So Successful?

1. Introduction On 12th of May 2017, unknown hackers launched a large-scale global ransomware attack. It affected more than 230,000 computers. The ransomware (WanaCrypt0r 2.0) used for conducting the...

View Article

Judy Malware: Millions of Android Devices Potentially Exposed

It has happened again; security experts have discovered a malicious application inside the official Google Play store. The new malware, dubbed “Judy,” is designed to infect Android devices and generate...

View Article

How to Protect Your Right to Personal Identity in the Digital Era

As stated by the FBI’s Internet Crime Complaint Center (IC3), identity theft “occurs when someone appropriates another’s personal information without their knowledge to commit theft or fraud.” Identity...

View Article

Hazards of Identity Theft

Scenario: You buckle down each day to bring home the bacon and bolster yourself as well as your family. You know how to keep your credit clean so you can appreciate the advantages of that diligent...

View Article


US Regions Most Vulnerable to a Cyber Attack

1. Introduction In December 2016, the Identity Theft Resource Center published a report indicating the top 10 cyber-risk vulnerable U.S. regions. The ten regions (ordered from high to low level of...

View Article

“Robin Hood” Ransomware and Psychological Manipulation Techniques

1. Introduction In 2016, the ransomware CryptMix gained popularity. CryptMix is based on source code of other infamous types of malware, such as CryptoWall 3.0, CryptoWall 4.0 and CryptXXX. In...

View Article


SAP SECURITY FOR CISO: SAP Attacks and Incidents

If you read this series, you already know enough about SAP ERP Security to discover a real impact of having insecure SAP implementation. Recently, Crowd Research Partners have released ERP...

View Article

Massive Petya Attack: Cybercrime or Information Warfare?

Hits organizations in several states Just five weeks after the WannaCry massive attack, a new wave of ransomware-bases attack hit targets in various countries worldwide. Like WannaCry massive attack,...

View Article


AlphaBay Market: What is the Impact of the Cyber-criminal Underground?

The AlphaBay Market was shut down by the law enforcement AlphaBay Market was the largest black marketplace on the Dark Web, it was an excellent aggregator for buyers and sellers of any kind of illegal...

View Article

Three Different Kinds of Online Scams

There are countless ways and endless criminals online looking to steal your personal information or gain access to your financial accounts. Being able to identify the most common types of online scams...

View Article

Steal iCloud Keychain Secrets via OTR

Apple iCloud Keychain In Mac OS 8.6, Apple introduced its Keychain password management system. Still integrated into every Mac OS release since then, Keychain provides a centralized storage for...

View Article
Browsing latest articles
Browse All 20 View Live




Latest Images