;D hi forum members,
Looks networking sites are now the favorite target of malware authors :o :-[,This is the link for the whole story http://blog.trendmicro.com/bogus-linkedin-profiles-harbor-malicious-content/
;D hi forum members,
Looks networking sites are now the favorite target of malware authors :o :-[,This is the link for the whole story http://blog.trendmicro.com/bogus-linkedin-profiles-harbor-malicious-content/
Hi malware fighters,
What is also new for LinkedIn: honeypot profiles. Some firms are being attacked by headhunters, to rob them of all their good staff members, so the place runs out of staff.
This is done through clever social engineering. One call to a general phone number to tell they saw the boss or technical manager during a party meeting, but have lost his card and some kind secretary will tell them the names of half of the staff, sometimes even will send the XLS with all of the staff, including personal phone numbers and names of staff members.
At the moment headhunters frequent LinkedIn. Firms are working now with so-called “bogus” profiles for key staff members. When a headhunter will react, at once the CEO or HR manager is being warned a competitor is out to snatch away colleagues, so they can plan a counter action,
polonus
Nothing new there then, social networking sites, facebook, youtube, etc. etc. have been that way for some time. So it just looks like they have added another form of social (professional) networking site to their targets.