Dell customers have been suffering from phone-based phishing scams, and some suggest the attackers are using stolen Dell information to support their social engineering. Whether or not that’s true, watch today’s video to learn a bit more about “vishing,” and how to identify and avoid it. (Episode Runtime: 3:30 ) Direct YouTube Link: https://www.youtube.com/watch?v=VouLQ4ki0ww EPISODE REFERENCES: Blog post suggesting Dell phone scammers using stolen data – 10zenmonkeys Was Dell hacked by vishers
Cybercrime; Is it out of control?
If the director of the CIA can’t keep his e-mail secure, what hope do the rest of us have — for our e-mail or any of our digital information? None, and that’s why the companies that we entrust with our digital lives need to be required to secure it for us, and held accountable when they fail. It’s not just a personal or business issue; it’s a matter of public safety.
Oracle follows a quarterly patch cycle, and today they released their big Critical Patch Update (CPU) for October 2015. Since they only update four times a year, they tend to release tons of patches at once. Today’s update fixes 154 vulnerabilities in a wide selection of their products — from MySQL to the Siebel CRM.
The Curious Case of the Document Exploiting an Unknown Vulnerability – Part 2: RATs, Hackers and Rihanna
Previously my colleague Wayne talked about an interesting document exploit targeting CVE-2015-1641. In this post, we will talk about who might be behind the attack. We start our correlation with the analysis of the exploit payload – a remote adminis…