Cybercriminals exploiting 'the human' to steal data
A new McAfee report shows criminals are increasingly targeting the human, rather than the technology, to steal personal data.

Criminals are increasingly using social engineering to collect personal data from social networking websites, data breaches and other sources according to McAfee.
Its recently released McAfee Security Journal threat report revealed that international experts and McAfee's Avert Labs saw the growing use of social engineering techniques, exploiting human mistakes and weakness rather than having to beat technology.
The Security Journal outlined four major global trends: that the depth of personalised attacks from social networking data would increase, socially-engineered spam would explode in numbers, stock scams would rise and there would be more malicious software which posed as security applications from trusted vendors.
"Cybercriminals are crafting attacks that are virtually impossible for computer users to identify," said Jeff Green, vice president at McAfee Avert Labs. "Phishing scams, e-mail attacks, Trojan horses, and other attacks are so personalised that even someone with the most watchful eye could fall for a carefully socially engineered trap."
As well as updating security technology, McAfee advised that users practiced safe computing and surfing, and to be wary about "too good to be true" offers that came through emails, IMs or social networking messages.
Green added: "It's an easy way for cybercrooks to make money and for spies to steal sensitive data."
McAfee said that in the last six months, scammers have increasingly targeted emotion and curiosity in attempts to steal information, such as with the Olympics, natural disasters and the US presidential election.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
The FBI says hackers are using AI voice clones to impersonate US government officials
News The campaign uses AI voice generation to send messages pretending to be from high-ranking figures
-
Employee phishing training is working – but don’t get complacent
News Educating staff on how to avoid phishing attacks can cut the rate by 80%
-
Russian hackers tried to lure diplomats with wine tasting – sound familiar? It’s an update to a previous campaign by the notorious Midnight Blizzard group
News The Midnight Blizzard threat group has been targeting European diplomats with malicious emails offering an invite to wine tasting events, according to Check Point.
-
This hacker group is posing as IT helpdesk workers to target enterprises – and researchers warn its social engineering techniques are exceptionally hard to spot
News The Luna Moth hacker group is ramping up attacks on firms across a range of industries with its 'callback phishing' campaign, according to security researchers.
-
Hackers are using Zoom’s remote control feature to infect devices with malware
News Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices.
-
State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique
News State-sponsored hackers from North Korea, Iran, and Russia are exploiting the ‘ClickFix’ social engineering technique for the first time – and to great success.
-
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
-
LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to know
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.