Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Security Information

Apple Users targeted in Phishing Campaign

Paul Anderson by Paul Anderson
October 11, 2014
in Information, Security
0
apple phishing 267265
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Based on the 2014 Global Phishing Study, Apple has become the “world’s most-phished brand.” A phishing attack is one in which a hacker sends you a text or email appears to be from a legitimate business or friend, and attempts to trick you into entering private data, a credit card number or any other financial details.

You might also like

BreachForums Owner Arrested and Charged

Stolen credit card market BidenCash leaks over 2 million credit cards

Cloudflare Stops Record-Breaking DDoS

The Global Phishing Survey notes there have been “at least 123,741 unique phishing attacks worldwide” within the first half of 2014 that each targeted a unique brand or entity. Almost 23,000 domains “were registered maliciously by phishers,” mostly in China, the report mentioned.

Phishing attacks are typical on all systems, not just Apple products. The attacks don’t rely upon technology, but on psychology (Social engineering): they attempt to fool users into giving up private info by impersonating websites or people they trust.

Even so, if you know what to look for, it’s often simple to differentiate between a legitimate email and a phishing attack.

iCloud and Apple phishing email:

phishing-email-apple-icloud

Satnam Narang, Security Response Director for Symantec, explained the indicators in this particular phishing email. “The subject is weird. ‘Apple Service Locked’? Apple wouldn’t write something like that,”. Another giveaway? “The ‘to’ line is addressed to a generic name, ‘Apple user,’ and an email address. Apple knows your Apple ID.”

And read carefully: “It is written in broken English,” Narang observes. The address on the bottom says ‘Apple Genius UK,’ then gives an address in Cupertino, CA.

 

You must also be aware of other personal information, like the answer to your security question, which could be used to hack into Apple or other accounts.

Tags: appleiCloudPhish
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

BreachForums Owner Arrested and Charged

by Paul Anderson
March 17, 2023
0
BreachForums Owner Arrested and Charged

On Wednesday afternoon, federal agents arrested a man in Peekskill, New York, for allegedly running a dark web data breach site known as "BreachForums." The suspect, Conor Brian...

Read more

Stolen credit card market BidenCash leaks over 2 million credit cards

by Paul Anderson
March 3, 2023
0
Stolen credit card market BidenCash leaks over 2 million credit cards

BidenCash, a marketplace that focuses on carding, has leaked a database of 2,165,700 credit and debit cards to celebrate its first anniversary. Instead of keeping the leak a...

Read more

Cloudflare Stops Record-Breaking DDoS

by Christi Rogalski
June 29, 2022
0
Cloudflare record breaking DDoS

Cloudflare has reported that it successfully neutralized the largest recorded DDoS attack in history. The attack, a 26 million request per second onslaught, targeted a customer on the...

Read more

Chrome Browser Extension Vytal Prevents Privacy Leaks

by Christi Rogalski
June 19, 2022 - Updated on June 20, 2022
0
Vytal Chrome Extension spoofs location data

Released in 2008, Google Chrome is a cross-platform web browser. With over 3.2 billion internet users worldwide, there's no denying that Chrome is the most popular browser today....

Read more

State-sponsored Iranian Hackers utilize .NET DNS Backdoor in new Attack

by Kyle
June 12, 2022
0
Lycaeum APT DNS hijacking backdoor

An Advanced Persistent Threat (APT) hacking group based out of Iran going by the name Lycaeum has been seen using a .NET-based DNS backdoor to target organizations within...

Read more
Next Post
Team of Hackers found to be Utlizing Windows Zero-days

Team of Hackers found to be Utlizing Windows Zero-days

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.