Archive | Social Engineering




Spammers Target Social Networking Sites

It makes sense, spammers will follow whatever is popular, wherever the social mass is at and reading they will bombard. In the earlier days Myspace was a big target, now they are moving on to other sites such as Facebook. Social networking sites are an ideal place for spammers as they can exploit the trust […]

Tags: , , , , , , , , , ,

Posted in: Social Engineering, Spammers & Scammers, Web Hacking | Add a Comment

Chocolate Owns Your Passwords

The same old story, if you ask people for something they will most likely give it without thinking of the consequences.. Even more so if you are a pretty girl, and in this case you offer someone chocolate. Hey who doesn’t love chocolate? I have to say I don’t love it enough to give out […]

Tags: , , , , , ,

Posted in: Privacy, Social Engineering | Add a Comment

Multilingual Worm Spreads Over MSN Messenger

Another MSN worm spreading with the same tactics as usual, “Wanna see my pictures before i send em to facebook?” and so on. The only really interesting thing about this worm is it sends the message in the language of the locale installed on the infected machine, this is pretty intelligent and is much more […]

Tags: , , , , , , , , , ,

Posted in: Malware, Social Engineering | Add a Comment

Doubleclick Involved in Malware Distribution

We recently reported on thousands of people being hooked by big sites distributing malware, it now seems Doubleclick was the one at fault. It’s a pretty neat trick and a good spin on Social Engineering leveraging on the trustworthy nature of the sites. CNN even? Rogue anti-spyware software that pushes fraudulent PC scans has found […]

Tags: , , , , , ,

Posted in: Malware, Social Engineering | Add a Comment

Thousands Hooked by Malware from Big Sites

If I recall this is not the first time this has happened, delivering viral payloads via banner ads and flaws in scripting. It seems that malware peddlers are getting more aggressive though, it obviously shows there is actual monetary value in infecting people and stealing their data. A subtle form of social engineering too, by […]

Tags: , , , , , ,

Posted in: Malware, Social Engineering | Add a Comment

Trojan Mimicks Windows Activation Interface – KardPhisher

Recently a new Trojan popped up that mimics the Windows activation interface, phishing for credit card details and even the PIN number. The Trojan itself isn’t particularly advanced technically, it’s mostly just a social engineering attack. Symantec is reporting on a Trojan horse that mimics the Windows activation interface. What they are calling Trojan.Kardphisher doesn’t […]

Tags: , , , , , , ,

Posted in: Malware, Social Engineering, Windows Hacking | Add a Comment

Social Engineering Gets a Big Jewel Heist

It just goes to show, sometimes the simple things are the most effective. A box of chocolates can defeat all the most hi-tech security systems if you add a little charm. 21 million Euros of diamonds, that’s one hell of a catch. A thief has evaded one of the world’s most expensive hi-tech security systems, […]

Tags: , , , ,

Posted in: Social Engineering | Add a Comment

Huge Online Loss by Swedish Bank Nordea – Claimed to be Biggest Loss?

A massive online heist, some (like McAfee) claim it’s the biggest ever online sting involving a bank, it’s comes in at about half a million pounds or or $1.1 million USD. Using some l33t0 custom trojan, it seems to be more a case of lack of education and the whole situation could have been avoided […]

Tags: , , , , , , , , , , , , ,

Posted in: General Hacking, Malware, Privacy, Social Engineering | Add a Comment

Domain Stealing or How to Hijack a Domain

Please note this is an old technique again, just for learning purposes, learn how the old techniques worked and why they worked, then try and discover new ways to do things. Summary The sole purpose of the information contained in this advisory is to point out the flaws in InterNIC’s domain name handling system and […]

Posted in: Network Hacking, Social Engineering | Add a Comment

How to get Ops and takeover a channel on IRC Hack Hacking

I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they […]

Tags: , , , , , , ,

Posted in: General Hacking, Old Skool Philes, Social Engineering | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·