Intentional security holes

Sinkholes and watering holes are two words not automatically associated with computer security, yet they are in use to describe two tactics that are used in this field.

Read more

Tech support scammer follow-up

This post is a sequel to Tech support scammers using Winlogon. As we have found after writing that post there are many variants of this scam.

Read more

Explained: typosquatting [updated]

Typosquatting is a term you may have seen when reading about internet scams. In essence it relies on users making typing errors (typos) when entering a site or domain name.

Read more

Email spoofing

Email spoofing basically comes down to sending emails with a false sender address. This can be used in various ways by threat actors.

Read more

Advanced phishing tactics used to steal PayPal credentials

A new example was found of a phishing mail trying to get a hold of your PayPal login credentials by using a javascript sending them to a data_receiver_url

Read more

Select your language