Consumer Threat Notices

Wrong Number: Phone Scammers Run Off With Millions by Impersonating Chinese Consulate Staff

Remember prank calls? We all used to make them as kids as a way to fake out friends and classmates. The age-old tradition isn’t just exclusive to teens, however, as cybercriminals still use the tactic modern day. Only their intentions are a bit more malicious than your average middle schooler. ...

Consumer Threat Notices

Why Social Engineering is a Scammer’s Secret Weapon

Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation is often referred to as social engineering, and it’s worth knowing about because although the scams change, the methods remain the same. Social engineering can happen online, over ...

Enterprise

Social engineering attacks you might see in the IoT

Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, ...

Enterprise Executive Perspectives

Social Engineering in the Internet of Things (IoT)

Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly retard development; making the consequences of social engineering attacks in the IoT very significant. Social engineering attacks will certainly evolve into the Internet of Things (IoT), if they have not ...

Mobile and IoT Security

Hacking Humans: How Cybercriminals Trick Their Victims

McAfee has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the chief way that the cybercriminals do this is via phishing scams—that are designed to take your money. The fact that two-thirds of all the emails out there on this planet ...

McAfee Labs

Hacking the Human OS: A Report on Social Engineering

Why are data breaches so commonplace?  Whether the attacks are against the energy sector as reported July 2014[i] with over 1,000 energy companies in North America and Europe reported to have been compromised.  To other attacks targeting other sectors (e.g. Operation Troy, Operation High Roller Nightdragon, etc.) it would appear ...

Consumer Threat Notices

Emma Watson Video Leak Scam: Hackers Use Celeb’s Popularity to Unleash Viruses on your Devices

Following the announcement of the 2014 Most Dangerous Celebrities™ earlier this month, our senses have been heightened to scams on the web involving Hollywood’s most famous. Well, it seems our fascination with lifestyles of the rich and famous have led us to yet another attack utilizing well-known celebs to spread ...

Consumer Threat Notices

The Surprisingly Simple Google Maps Attack That Shut Down a Business

Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map—a digital map. WIRED has an excellent profile on a type of cyber attack that takes advantage of a service’s social aspects in an effort to divert, ...

Subscribe to McAfee Securing Tomorrow Blogs