Dozens of Israeli soldiers have had their smartphones hacked by the Hamas militant group posing as women seeking attention, Israel’s military says. A spokesman said the soldiers were sent fake photos of young females and lured into downloading an app without knowing it could access their handsets. He said there was no “significant breach of… Read more »
Posts Categorized: Phishing
The Royal Canadian Mint fell for what’s known as a “spear-phishing” scam and almost forked over an employee’s paycheque to fraudsters, according to a breach report obtained through access to information. Spear-phishing is a type of fraud which sees swindlers carefully collect information on a target in order to impersonate them. It’s one of the “most common and most dangerous… Read more »
Discussion: Piracy of software has become a major issue for software companies. How do they trust that the companies who bought their software are keeping to their contract? In this case the US government bought the right to have 500 users, but were caught having 9,000 users. Source: BBC News Date: November 30, 2013 Link: http://www.bbc.co.uk/news/technology-25137089 Questions for… Read more »
Discussion: ICANN, which stands for the Internet Corporation for Assigned Names and Numbers, is the nonprofit group that assigns addresses to Internet service providers. They have recently announced that they will now be taking applications so that private companies and governments can purchase their own domain endings. Right now there are only 22 domains, including… Read more »
Description: Link to How Stuff Works for discussion about how to protect from phishers. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing3.htm Discussion Questions: Is the protection against phishers effective?
Description: Link to foundational knowledge to do with phishing for discussion. Source: Tracy Wilson, How Stuff Works Link: http://computer.howstuffworks.com/phishing.htm Discussion Questions: What is phishing?