Beware This Clever “Fake Attachment” Gmail Phishing Scam

Lifehacker points out a new, tricky phishing scheme affecting Gmail users that uses an embedded image made to look like an attachment:

XMLRPC or WP-Login: Which do Brute Force Attackers Prefer

Wordfence blog has an article discussing common attack methods in brute-forcing WordPress login attempts:

How Stolen iOS Devices Are Unlocked

For a number of years now, Apple has been implementing “Activation Lock” and “Find my iPhone” to deter the theft of iOS devices. According to some statistics, this effort has had some success. But with millions of users carrying devices costing $500 and more loosely secured in their pockets, mobile devices far exceed the value of an average wallet.

Activation Lock links a device to a user’s iCloud account. If a user configures a new device, the user is asked for iCloud credentials or offered to set up a new iCloud account. A device can not be activated without providing this information. If you sell or pass on a device, deleting the data from the device is not sufficient, but you will also have to remove the link to your iCloud account, for example by turning off “Find My iPhone.” Changing the setting always requires at least a password (and if configured two-factor authentication). Biometrics can be used to unlock the phone, but it can not be used to remove the iCloud link.

But iOS devices are still being stolen, and thieves have come up with some rather ingenious methods to unlock them…

Battling the Botnet Armies

Botnet armies have become bigger, more active and more heavily armed than ever before. In the first quarter of 2016, attacks launched by bots reached a record high of 311 million—a 300 percent increase compared with the same period in 2015 and a 35 percent increase compared with the final quarter of 2015.

Cerber Ransomware Used in Massive Attack Targeting Office 365 Users

Over the past months, ransomware has become a widespread cyber-threat aimed at enterprises and consumers alike, and a recent massive attack against Office 365 users proves that once again.

Photo-Stealing Android App Uses Time-Delay Attack

A malicious mobile application targeting Android users managed to trick the Google Bouncer protection system and slip into the Google Play marketplace by employing a time-delay attack technique, Symantec researchers warn.