Keyword: spearphishing

Brevity: Headers | « Text »
  • Officials Warn of 'Phishing' Scams Targeting Troops

    05/11/2010 6:33:58 PM PDT · by Cindy · 7 replies · 236+ views (AMERICAN FORCES PRESS SERVICE) ^ | May 10, 2010 | By Lisa Daniel
    Note: The following text is a quote: Officials Warn of ‘Phishing’ Scams Targeting Troops By Lisa Daniel American Forces Press Service WASHINGTON, May 10, 2010 – U.S. Strategic Command officials are urging renewed vigilance against Internet-based identity theft after detecting a widespread “phishing” expedition against servicemembers. Phishing is a term used to describe deceiving people into divulging personal information such as passwords or account numbers over the Internet. Beginning as early as May 2009 and lasting as late as March 2010, numerous fraudulent e-mails were sent to financial customers of USAA and Navy Federal Credit Union, Stratcom officials said in...
  • Megan Fox Sweats While the USAF Melts

    05/06/2010 10:08:28 PM PDT · by myknowledge · 6 replies · 1,326+ views
    Strategy Page ^ | May 4, 2010
    Offers to hire American airmen, stationed at an airbase on the Central Pacific island of Guam, as extras in the Transformers 3 movie, turned out to be an unexpectedly scary training exercise. First, keep in mind that there is no Transformers 3 filming scheduled for Guam. The email was a fake, used to test how well airmen could detect a hacker attempts to deceive military Internet users to give up valuable information. The Transformers 3 email was a test to see how many airmen would fall for a "spear phishing" offensive. "Phishing" (pronounced "fishing") is when a hacker sends out...

    11/18/2009 2:53:45 AM PST · by Cindy · 2 replies · 384+ views ^ | November 17, 2009 | n/a
    Note: The following text is a quote: SPEAR PHISHING E-MAILS TARGET U.S. LAW FIRMS AND PUBLIC RELATIONS FIRMS 11/17/09—The FBI assesses with high confidence that hackers are using spear phishing e-mails with malicious payloads to exploit U.S. law firms and public relations firms. During the course of ongoing investigations, the FBI identified noticeable increases in computer exploitation attempts against these entities. The specific intrusion vector used against the firms is a spear phishing or targeted socially engineered e-mail designed to compromise a network by bypassing technological network defenses and exploiting the person at the keyboard. Hackers exploit the ability of...