This Trend Micro paper unravels a series of attacks that targets military officials and defense contractors. Dubbed as “Operation Pawn Storm,” the group of threat actors use two known attack vectors: spear phishing emails and a network of phishing websites.
Twitter is a very popular online social platform because it's lightweight, easy to use, and widely adopted. Unfortunately these reasons also make it a prime target for abuse. See how this is done, and how to avoid being a victim.
As news about the Ebola pandemic flooded the Internet, cybercriminals and have seized the opportunity to use the popularity of the topic as bait to lure unsuspecting victims to pages that could be used to steal their information and credentials.
If an attacker successfully exploits a vulnerability we found in older versions of Spotify for Android, the attacker can use this vulnerability to phish data. Spotify's prompt action to patch this vulnerability protects its users from this threat.