In mobile cyberwar, attackers prefer to phish rather than send malware

After examining half a billion emails sent between January and June, researchers at FireEye revealed that an alarming one out of every 101 emails are malicious, but it’s not just malware that you should be looking out for. While malicious emails can either contain a link to convince you to download harmful software onto your system, attackers can also deceive you into divulging sensitive information through phishing scams.

In fact, 10 percent of all malicious emails sent today contain viruses, worms, ransomware, trojans, spyware, or adware. These emails are classified as malware. However, most emails — an overwhelming 90 percent — are based on social engineering scams, such as spear phishing, impersonation, credential harvesting, or other schemes. The number of non-malware scams has increased by 65 percent year-over-year.

The shift in attack strategy has been largely driven by the adoption of mobile devices. Because most people check their emails on their phones, it’s harder to send a virus that way and attackers are changing their strategy. “With email security solutions focused on detecting malware, cybercriminals are adapting their attacks, exposing organizations to malware-less assaults such as CEO fraud,” FireEye reported.

Researchers noted that it’s easier for hackers to trick their victims into thinking they’re communicating with someone they know with CEO fraud and spear phishing campaigns because “most mobile email clients display only the sender’s name — and not an email address.” By using social engineering, these types of attacks are much easier to carry out against victims using mobile devices. Hackers no longer have to spoof an entire domain name — instead, all they need to do is convince you that you’re communicating with a trusted person, like a boss or CEO, by faking the name displayed in the header of the message.

Though phishing campaigns have been on the rise worldwide, these types of attacks have gained a lot of publicity in the United States since the 2016 presidential election. It’s been reported that a successful phishing attempt gave Russian hackers to approximately 60,000 emails belonging to John Podesta, the campaign chairman of Hillary Clinton. The tactic was also used to breach the network of Sony Picture Entertainment in a highly publicized hack in 2014.

FireEye claims that email is the most popular vector for cyber attacks, and that “91 percent of cybercrime starts with email.”

Product Review

The powerhouse Alienware 17 R5 will leave your desktop in the dust

With a 17-inch display and a chassis weighing in at nearly 10 pounds, the Alienware 17 R5 is truly massive. Between its weight and its hardware, it’s certainly outfitted like a gaming desktop so let’s find out if it performs like one.
Computing

Google tells lawmakers it allows other apps access to your Gmail

Google admitted to lawmakers in a letter that its privacy policy allows third-party apps access to the email messages of its 1.4 billion Gmail users. Google says the apps need the consent of users before access is granted.
Computing

Smart Reply not smart enough? Desktop Gmail users can soon opt out

Google will soon give desktop Gmail users the ability to opt out of Smart Reply. If you'd prefer to compose a short email the old-fashioned way, you can do so without seeing the auto-generated suggestions in the future.
Computing

Windows improves handwriting-recognition skills at the peril of users’ security

A Windows file that is designed to help improve the platform's ability to translate your handwritten notes into readable text may be a security concern. One researcher found it contained passwords and email contents.
Computing

A vigilante botnet is taking out crypto-jacking malware

A new botnet is on the rise but it isn't being used to take down websites or hack servers, it's going after crypto-jacking malware. When it discovers the malware on a website, it takes it over before destroying them both.
Computing

Edit, sign, append, and save with 12 of the best PDF editors

There are plenty of PDF editors to be had online, and though the selection is robust, finding a solid solution with the tools you need can be tough. Here, we've rounded up best PDF editors, so you can edit no matter your budget or OS.
Product Review

The HP Chromebook x2 takes Chrome to the next level

HP’s Chromebook x2 acts a lot like Microsoft’s Surface Book 2, with a well-equipped tablet that plugs into a keyboard base that’s heavy enough to keep the combination mostly stable. Is this premium Chromebook the best one you can buy?
Computing

Pain in the wrists? Type in comfort with one of these great ergonomic keyboards

Long typing sessions can leave anyone's wrists aching, but if you have one of the best ergonomic keyboards, that doesn't have to be the case. Our list of favorites will support good typing posture while being comfortable to use.
Gaming

Dive head first into the best experiences available now on the Oculus Rift

The Oculus Rift brought back virtual reality and put a modern twist to it. Grab your Touch Controllers, put on your VR headset, and jump into the fun with some of the best Oculus Rift games available now.
Computing

Ripple cryptocurrency jumps 70 percent in 24 hours after news of bank deal

The Ripple cryptocurrency has seen its value reach the highest point since late 2017 after a tease from a Ripple Labs regulator suggested it could soon be adopted by banks for international money transfers.
Computing

From beautiful to downright weird, check out these great dual monitor wallpapers

Multitasking with two monitors doesn't necessarily mean you need to split your screens with two separate wallpapers. From beautiful to downright weird, here are our top sites for finding the best dual monitor wallpapers for you.
Computing

Gaming on a laptop has never been better. These are your best options

Gaming desktops are powerful, but they tie you down to your desk. For those of us who prefer a more mobile experience, here are the best gaming laptops on the market, ranging from budget machines to maxed-out, wallet-emptying PCs.
Computing

Tired of paying for shipping? Here's how to set up an Amazon Prime account

Want to know how to sign up for Amazon Prime? It's easier than you might think and even comes with a free trial so that you can enjoy all of its benefits for 30 days risk-free. Just follow these steps.
Social Media

Twitter squashes security bug leaking direct messages since 2017

The team at Twitter has discovered and corrected a security bug within one of their developer APIs that has been leaking sensitive information sent via direct messages to business accounts.