The targeted attack campaign dubbed Red October raises an interesting question for people working on the frontline of corporate security. How to defend one’s own organization against such attacks? And the good news is that at least for campaigns such as Red October, the information has been available for a long time already. From a […]
Fake applications offered by phishing sites continue to appear. In December 2012, a fake app was seen that was titled, “Facebook 2013 demo”. Social networking users in India were most likely targeted in this phishing attack because the phishing URL consisted of certain words in Hindi. The phishing site was hosted on a free Web-hosting […]
Latest Comments