Phishing
Avoiding Fuelling the Cyber-Crime Economy
August 11, 2020 Added by:Marc Wilczek
What drives the cyber-crime economy, and how can organizations prevent their data being used as a criminal commodity?
Comments (0)
Could the Twitter Social Engineering Hack Happen to You?
August 10, 2020 Added by:Tim Mackey
The phishing attack on Twitter employees serves as an opportunity for all businesses to reassess how they build and deploy application
Comments (0)
Why Zero Tolerance Is the Future for Phishing
January 09, 2019 Added by:Gary De Mercurio
Phishing attacks are really the ones that bring most organizations to their knees and are at the very start of some of the most devastating cyberattack
Comments (0)
Trojan Horses for the Mind
December 07, 2018 Added by:Perry Carpenter
When designed well, our messaging can sneak past mental defenses and noise. In other words, the way we design and deliver our messages can become a Trojan Horse.
Comments (0)
How to Protect SMBs Against Phishing Attacks via Social Engineering
November 06, 2018 Added by:Timur Kovalev
Attackers are constantly changing tactics, so ensuring that you are armed against the latest threats is critical.
Comments (0)
How Can Businesses Protect against Phishing Attacks on Employee Smartphones?
October 11, 2018 Added by:Matt Johnson
It is vital that business leaders educate themselves on the types of attacks that today’s scammers are using, and advise employees on how best to protect themselves.
Comments (0)
DNC Phishing Scare Was a Training Exercise Gone Awry: Lessons Learned
October 02, 2018 Added by:Perry Carpenter
The recent phishing attack on the Democratic National Committee (DNC) was only a test conducted by the Michigan Democratic Party.
Comments (0)
Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment
December 11, 2017 Added by:Perry Carpenter
As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?
Comments (0)
Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks
November 07, 2017 Added by:Asaf Cidon
Artificial intelligence to stop spear phishing sounds futuristic and out of reach, but it’s in the market today and attainable for businesses of all sizes, because every business is a potential target.
Comments (0)
Convenience Comes at a Steep Price: Password Management Systems & SSO
July 12, 2017 Added by:Alexandre Cagnoni
Many consumers and businesses are flocking to the mirage of safety offered by password management firms, which are only as strong as their weakest link (often humans).
Comments (0)
Make Sure We're Using the Same Language
June 27, 2017 Added by:Jay Kelley
Punycode (a way to represent various non-ASCII characters) can be used for malicious purposes, as a Chinese researcher discovered earlier this year.
Comments (0)
When Is Apple.com Not Apple.com? Faked Punycode Domains Running Rampant
May 01, 2017 Added by:Magni R. Sigurdsson
We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.
Comments (0)
Stop the Phishing Frenzy; Arm Against the Danger with Detection and Response
December 23, 2016 Added by:Gary Southwell
Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.
Comments (0)
Beyond Phishing: What You Need to Know About Whaling
June 13, 2016 Added by:Dan Lohrmann
Just when you thought you had seen it all regarding online phishing scams, along comes a new round of deceptive emails, phones calls, instant messages and even traditional printouts from your fax machine.
Comments (0)
Baiting the Phishermen: When Companies Strike Back at Scammers (Do Not Try This at Home)
May 16, 2016 Added by:Steven Rogers
It is never too late to remind employees about phishing emails and where to route suspicious finds.
Comments (0)
A Security Lesson from Down Under: Australia’s Banking App Malware Theft
April 20, 2016 Added by:Harvey Boulter
The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.
Comments (0)
- GitHub Hires Former Cisco Executive Mike Hanley as Chief Security Officer
- Reddit Names Allison Miller as Chief Information Security Officer (CISO)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps