Cybercriminals exploiting 'the human' to steal data
A new McAfee report shows criminals are increasingly targeting the human, rather than the technology, to steal personal data.

Criminals are increasingly using social engineering to collect personal data from social networking websites, data breaches and other sources according to McAfee.
Its recently released McAfee Security Journal threat report revealed that international experts and McAfee's Avert Labs saw the growing use of social engineering techniques, exploiting human mistakes and weakness rather than having to beat technology.
The Security Journal outlined four major global trends: that the depth of personalised attacks from social networking data would increase, socially-engineered spam would explode in numbers, stock scams would rise and there would be more malicious software which posed as security applications from trusted vendors.
"Cybercriminals are crafting attacks that are virtually impossible for computer users to identify," said Jeff Green, vice president at McAfee Avert Labs. "Phishing scams, e-mail attacks, Trojan horses, and other attacks are so personalised that even someone with the most watchful eye could fall for a carefully socially engineered trap."
As well as updating security technology, McAfee advised that users practiced safe computing and surfing, and to be wary about "too good to be true" offers that came through emails, IMs or social networking messages.
Green added: "It's an easy way for cybercrooks to make money and for spies to steal sensitive data."
McAfee said that in the last six months, scammers have increasingly targeted emotion and curiosity in attempts to steal information, such as with the Olympics, natural disasters and the US presidential election.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
By Jane McCallion Published
-
LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to know
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.
By Solomon Klappholz Published
-
Phishing campaign targets developers with fake CrowdStrike job offers
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz Published
-
Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets
By Richard Speed Published
-
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly Published
-
CISA: Phishing campaign targeting US federal agencies went undetected for months
News Threat actors used legitimate remote access software to maliciously target federal employees
By Rory Bathgate Published
-
Google Ads malvertising campaign prompts questions around Search security
News A leading security researcher has called into question why Google still allows malware links to top search results
By Rory Bathgate Published
-
Uber hacked via basic smishing attack
News The self-taught hacker impersonated an IT worker to gain an Uber employee's password, obtaining broad access to internal systems and posting taunting messages
By Rory Bathgate Published