FBI and Homeland Security Breached

February 9, 2016

Personal information about tens of thousands of FBI and Homeland Security employees appears to have been compromised.

Learn more at our new blog.


Nuclear Spearphisher Pleads Guilty

February 5, 2016

On February 2, 2016, the U.S. Justice Department announced that Charles Harvey Eccleston, a former employee of the the U.S. Nuclear Regulatory Commission (NRC), pleaded guilty to an attempted e-mail “spearphishing” attack that targeted dozens of Department of Energy (DOE) employee e-mail accounts.

720px-US-NuclearRegulatoryCommission-Logo.svg

The attack targeted U.S. government computer systems that contained sensitive nuclear weapon-related information.

Learn more at our new blog.


How Chinese Cyber Attacks Work

January 18, 2016

Yesterday 60 Minutes on CBS broadcast The Great Brain Robbery: Economic espionage sponsored by the Chinese government is costing U.S. corporations hundreds of billions of dollars and more than two million jobs. On the 60 Minutes website is posted extra content called “Correspondent Candid” which is embedded below. In this segment, we learn exactly how the Chinese steal our stuff.

chinese spies

Learn more at our new blog.


Spearphishing Plunges 700,000 People Into Darkness

January 7, 2016

ESET is reporting that on December 23, 2015, about half of the 1.4 million residents of Ukraine’s Ivano-Frankivsk region were left without power as the result of a spearphishing attack being attributed to Russia.

Ukraine Utility

Ukraine Utility Prykarpattya Oblenergo

The attack on Prykarpattya Oblenergo was the classic spearphishing attack.

Learn more at our new blog.


Cyberattack Evolution

December 22, 2015

Social engineering cyberattacks target people. The objective of these cyberattacks is to trick people into compromising their systems. See how an attack evolved over time to improve its evil power. Learn more at our new blog.


Kaspersky Releases 2015 Top Security Stories

December 4, 2015

Kaspersky just released its 2015 Top Security Stories. The major theme is the growth of targeted attacks. In the targeted attack, the bad guy infiltrates systems by socially engineering the users. Kaspersky created this graphic which shows how a gang of cybercriminals stole $1 billion.

kasperky 2015

As you can see, the infection phase uses a spearphishing email to gain the entry into the systems. Learn more at our new blog.


India Cyberattacks Pakistan — Using Spearphishing

November 24, 2015

A recent article posted at techviral describes how Indian cyberattackers are using spearphishing to attack Pakistani and UAE websites. The post discusses how the Indian hacking groups called the Shakti Campaign and the VVV use deceptive emails to gain control of targeted computers.

Learn more at our new blog.


Follow

Get every new post delivered to your Inbox.