article thumbnail

LLMs and Phishing

Schneier on Security

But while it’s an easy experiment to run, it misses the real risk of large language models (LLMs) writing scam emails. Today’s human-run scams aren’t limited by the number of people who respond to the initial email contact. In 2012, researcher Cormac Herley offered an answer : It weeded out all but the most gullible.

Phishing 338
article thumbnail

The Cost of Cybercrime

Schneier on Security

Really interesting paper calculating the worldwide cost of cybercrime: Abstract: In 2012 we presented the first systematic study of the costs of cybercrime. Our conclusions remain broadly the same as in 2012:it would be economically rational to spend less in anticipation of cybercrime (on antivirus, firewalls, etc.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Internet Savvy are Your Leaders?

Krebs on Security

But it wasn’t until the past week that it become clear how many organizations — including towns, cities and political campaigns — actually have fallen for this brazen scam. Davis , a former Democratic state representative from Kansas handed $85 (PDF) to Web Listings in 2012. Image: Better Business Bureau.

Internet 248
article thumbnail

The Olympics: a timeline of scams, hacks, and malware

Malwarebytes

2012 London. Articles warning of dangers mainly focused on search engine poisoning (still a threat back in 2012), fake sites, streaming , and once again Twitter makes an appearance as “one to watch.” In terms of actual attacks which took place, we see the rise of mobile as a way in for Olympics scams. What a combo!

Scams 143
article thumbnail

An Interview With the Target & Home Depot Hacker

Krebs on Security

That investigation detailed how the 38-year-old Shefel adopted the nickname Rescator while working as vice president of payments at ChronoPay , a Russian financial company that paid spammers to advertise fake antivirus scams, male enhancement drugs and knockoff pharmaceuticals. In a series of live video chats and text messages, Mr.

Retail 264
article thumbnail

Gen Z’s Rising Susceptibility to Social Engineering Attacks

Security Boulevard

Gen Z, or individuals born between 1997 and 2012, have certain types of lifestyles, upbringings and character traits that make them ideal for social engineering exploitation. The post Gen Zs Rising Susceptibility to Social Engineering Attacks appeared first on Security Boulevard.

article thumbnail

Who’s Behind the Botnet-Based Service BHProxies?

Krebs on Security

Last year, researchers at Minerva Labs spotted the botnet being used to blast out sextortion scams. BHProxies has authored 129 posts on Black Hat World since 2012, and their last post on the forum was in December 2022. The website BHProxies[.]com The account didn’t resume posting on the forum until April 2014. .”