Over 130 companies have been compromised by a series of attacks that built upon the data first obtained from telcos.
Argishti Khudaverdyan used phishing and social engineering to fool T‑Mobile employees into giving him access to corporate systems.
Opinions about how to respond to a crime change according to the frequency of that crime.
Some people are likely to fall for phishing messages, whilst others are very good at identifying and reporting them.
Telstra CEO Andy Penn is partnering with government to filter bogus text messages in a trial that will likely be extended much more widely in future.
Criminals phone staff as they work at home, then tell them to log on to phishing websites that look like corporate portals.
The criminal gang used the phone numbers and email addresses of BT customers to make luxury purchases with PayPal.
Targets were invited to ‘friend’ a Facebook profile that looked like it belonged to a colleague.
We can collect and share data to identify fraudsters but the same data can be used by fraudsters to target us.
Training staff to identify security infringements and attempted fraud may not seem very sophisticated, but delivers significant benefits if done effectively.