Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Phishing: What Once Was Old Is New Again
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
ShaneW123
100%
0%
ShaneW123,
User Rank: Apprentice
6/11/2015 | 11:44:43 PM
Phishing never was Old!
Phishing is as effective as it was years back. I remember the best tactic to distract the email users is to email them about that huge amount of money they are going to recieve. and once they share their bank details, all is gone!! 
place4papers
0%
100%
place4papers,
User Rank: Apprentice
8/6/2014 | 9:53:22 AM
Re: Not to think...
I always knew that history is repeating itself. However, I would never think that it can be the case with phishing. Not so long ago I bought a brilliant research paper from place4papers.com, the best paper writing service I ever used.
dak3
50%
50%
dak3,
User Rank: Moderator
8/1/2014 | 10:35:25 AM
Re: Creating a bank account with an online bill as a proof of identity???
It doesn't take much to open a bank acct, and a utility bill is one of the "proofs of identity" that's accepted by almost all of them....
DarkReadingTim
100%
0%
DarkReadingTim,
User Rank: Strategist
7/31/2014 | 3:12:15 PM
Re: Not to think...
One thing about phishing -- it works. Almost all of the recent major breaches we've reported have started with some element of phishing -- 1 or 2 people fooled into giving away their credentials or clicking on a link. And the resources devoted to finding and fooling those particular individuals that hold the keys is impressive. A criminal may know everything there is to know about an admin or an IT person who has access to the credentials they want.
prospecttoreza
50%
50%
prospecttoreza,
User Rank: Strategist
7/31/2014 | 9:47:05 AM
Creating a bank account with an online bill as a proof of identity???
"They can potentially use these bills in the money laundering process such as in creating a bank account in someone else's name and using the online bill as proof of identity."

I really hope that bank regulations do not allow for this.

And if you thought that paying with a personal check is getting outdated - think again.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
7/30/2014 | 3:50:54 PM
Re: Not to think...
I can remembver when my 20-something sat on my lap while I was sending emails on my desktop, looking into a big blocky CRT screen.  Her phone is never off today. I can only imagine what the world will be like for your kiddos...
D.M. Romano
50%
50%
D.M. Romano,
User Rank: Apprentice
7/30/2014 | 3:38:03 PM
Re: Not to think...
@Marilyn - You mentioned tweenies, heck my 6 and 4 year olds play with my phone maybe as much as I do. And that includes apps and the internet (youtube, mainly). Either way, the time has indeed come. 
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
7/30/2014 | 3:31:02 PM
Re: Not to think...
@D.M. Romano Yes, I think the time has come that kind of preschool education.

As for Robot & Frank, @dak3,that's a new one for me! I'll put it on my watch list!

D.M. Romano
50%
50%
D.M. Romano,
User Rank: Apprentice
7/30/2014 | 3:22:20 PM
Re: Not to think...
I'll tell you what, an internet safety "children's book" is a hot idea. Matter of fact, I'm getting on that ASAP!
dak3
50%
50%
dak3,
User Rank: Moderator
7/30/2014 | 3:21:43 PM
Re: Not to think...
See the moive "Robot & Frank"....
Page 1 / 2   >   >>


More SolarWinds Attack Details Emerge
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/12/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-36192
PUBLISHED: 2021-01-18
An issue was discovered in the Source Integration plugin before 2.4.1 for MantisBT. An attacker can gain access to the Summary field of private Issues (either marked as Private, or part of a private Project), if they are attached to an existing Changeset. The information is visible on the view.php p...
CVE-2020-36193
PUBLISHED: 2021-01-18
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...