Over the last year, the world has witnessed large-scale financial fraud. And while we spend a lot of time talking about identity protection, today’s blog is about how the cybercriminals actually go about stealing your data, how they go about conducting these massive espionage initiatives and other attack methods, like identity theft.
That’s right folks… fraud is the latest offering in the service industry. Cybercriminals are selling ‘ready made’ kits, renting out botnets and malicious code such as the Zeus Trojan, Spy Eye and others.
A recent study showed that out of one billion email messages analyzed in a six-month period, dozens had been subject to "longline" phishing attacks. These attacks were so efficient that over 10% of the recipients were tricked into clicking on malicious content capable of taking complete control of PCs and compromising corporate networks.
With all the hacks we’ve been hearing about lately, the need for stronger and unique passwords has become more stringent than ever. Good thing researchers are constantly seeking new ways to enhance the safety and ease of use of online authentication systems. It is possible that in a not so distant future we may even be able to authenticate using pass thoughts instead of passwords.
Security researchers have recently discovered a new Android Trojan that can harvest a victim's contact list, send and intercept SMS (text) messages, make phone calls (including calls to premium numbers), and install additional malware packages – all at the same time.