
Tech support scams have diversified into new territory. They now use pop-up alerts and social engineering tactics to spread fake toll-free numbers and links of their fake tech support websites on popular social media platforms.
Read MoreTech support scams have diversified into new territory. They now use pop-up alerts and social engineering tactics to spread fake toll-free numbers and links of their fake tech support websites on popular social media platforms.
Read MoreMalicious browser extensions bring about security risks as these often lead to system infection and unwanted spamming on Facebook. Based on our data, these attacks have notably affected users in Brazil. We have previously reported that cybercriminals are putting malicious browsers in the official Chrome Web store. We also came across malware that bypasses a Google security…
Read MoreIn the two previous parts of this series of blog posts, we discussed the kinds of threats that we’re seeing on Twitter, as well as the scope and scale of these threats. In this part, we will discuss their motivations, and what end users can do. The first question is: why do cybercriminals bother doing…
Read MoreIn the previous blog post of this series, I introduced our paper titled An In-Depth Analysis of Abuse on Twitter that looked at the threats in the Twitter landscape, and explained the various kinds of malicious tweets we’ve seen. In this post, we look at the scope and scale of these threats. Malware Tweets Users in the…
Read MoreTwitter is an important means of communication for many people, so it shouldn’t be a surprise that it has become a medium that is exploited by cybercriminals as well. Together with researchers from Deakin University, we have released an in-depth paper titled An In-Depth Analysis of Abuse on Twitter that looks at the scale of this…
Read More