Viewing posts tagged Phishing and Fraud
highly-highly-targeted-attacks-against
Posted by: admin 14 years ago
I've blogged in the past about targeted phishing attacks and Alex Eckelberry has analyzed a particularly nasty example.. According to the Register the scam is highly targeted:
the BBB scam is narrowly targeted and is aimed at those who are likely to have the most sensitive information to lose. No more than one executive of a company is targeted, and the email goes to great lengths to get the names of the exec and the exec's company correct.What's not clear is whether the attackers are trying to get corporate information from an executive's PC or just personal information from high-value targets. More than likely the answer is both
hsbc-accuses-competitors-of-competing
Posted by: admin 14 years ago
From ZDNet UK:
Speaking at the Gartner IT Security Summit 2006, Brendan Pickering, group head of fraud technology at HSBC, accused rival banks of getting into an "arms race" approach to authentication.What is next? Lowering interest rates to gain market share? Having people in a branch? Advertising? Where will it stop?
etrade-to-deploy-rsa-tokens-but-does-it-stop
Posted by: admin 14 years ago
ETrade announced that they would be offering RSA SecurID key fob tokens to account holders with more than $50,000 in assets.another-plug-for-strong-authentication
Posted by: admin 14 years ago
A great analogy: strong authentication is like Penicillin for your network securityestonian-phisher-nabbed
Posted by: admin 14 years ago
"Pau said the suspect stole the money by infecting thousands of computers with a clever - and for a long time undetectable - trojan that transmitted their personal information, including internet banking account numbers and passwords, to him."Recent Posts
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
- WiKID Android tokens had their data deleted over the weekend by Google Chrome bug
- Scalability improvements in version 5.0 of the WiKID Strong Authentication server
Archive
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)