Israeli soldiers duped by Hamas ‘fake women’ phone ruse

Posted by & filed under Cyber Security, Cyberattack, Phishing.

Dozens of Israeli soldiers have had their smartphones hacked by the Hamas militant group posing as women seeking attention, Israel’s military says. A spokesman said the soldiers were sent fake photos of young females and lured into downloading an app without knowing it could access their handsets. He said there was no “significant breach of… Read more »

Fraudsters almost swindled the Royal Canadian Mint with payroll ‘spoofing’ scam

Posted by & filed under Cyber Security, Phishing.

The Royal Canadian Mint fell for what’s known as a “spear-phishing” scam and almost forked over an employee’s paycheque to fraudsters, according to a breach report obtained through access to information. Spear-phishing is a type of fraud which sees swindlers carefully collect information on a target in order to impersonate them. It’s one of the “most common and most dangerous… Read more »

US agrees to pay $50m after ‘piracy’ of software

Posted by & filed under Phishing.

Discussion: Piracy of software has become a major issue for software companies. How do they trust that the companies who bought their software are keeping to their contract? In this case the US government bought the right to have 500 users, but were caught having 9,000 users. Source: BBC News Date: November 30, 2013 Link: http://www.bbc.co.uk/news/technology-25137089 Questions for… Read more »

Explaining the Internet’s new domain endings

Posted by & filed under Cyber Security, E-Business, E-Commerce, IT Trends, Phishing.

Discussion: ICANN, which stands for the Internet Corporation for Assigned Names and Numbers, is the nonprofit group that assigns addresses to Internet service providers.  They have recently announced that they will now be taking applications so that private companies and governments can purchase their own domain endings.  Right now there are only 22 domains, including… Read more »

How Stuff Works – Protection from Phishing

Posted by & filed under IT Security, Phishing.

                  Description: Link to How Stuff Works for discussion about how to protect from phishers. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing3.htm Discussion Questions: Is the protection against phishers effective?

How Stuff Works – Phishing

Posted by & filed under IT Security, Phishing.

                    Description: Link to foundational knowledge to do with phishing for discussion. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing.htm Discussion Questions: What is phishing?