Share with your network!
- Do you use social logins on apps or websites? A tool called “Reconnect” is allowing attackers to hijack accounts on sites using Facebook logins due to a security gap. Citing compatibility issues, Facebook declined to fix the problem when it was brought to light in 2014, so researchers released the tool in order to encourage a speedy fix.
- CTOs at American companies were targeted in a tax-themed spear phishing attack. The attachments contained Microsoft Word files with malicious macros. If infected, the Trojan from the macros could collect login credentials for online banking and social networking sites.
- A phishing attack targeting Bank of America customers asks them to verify account information, but instead steals your online banking login information and drains your funds.
- Did you get an email from a .gov account? Researchers have discovered a security loophole that allows attackers to bypass the Sender Policy Framework (SPF) email validation, making it difficult for filters to mark phishing attacks from .gov email addresses as spam.
- Google Apps had a serious flaw that allowed cybercriminals to register a corporate administrative email address and send white-listed phishing attacks.
- The average time for an attacker to access your compromised account following a successful phishing attack where they steal your password is under 30 minutes. And, even worse, 45% of users that visit convincing phishing pages are tricked into sharing their information, according to Google.