Blog Posts Tagged with "Phishing"
The Biggest Security Hurdles in Your Business, and How to Overcome Them
January 23, 2019 Added by:Matt Johnson
Many organisations are still left in the dark when it comes to exactly what the most common, and pressing cyber security challenges are.
Comments (0)
Why Zero Tolerance Is the Future for Phishing
January 09, 2019 Added by:Gary De Mercurio
Phishing attacks are really the ones that bring most organizations to their knees and are at the very start of some of the most devastating cyberattack
Comments (0)
Trojan Horses for the Mind
December 07, 2018 Added by:Perry Carpenter
When designed well, our messaging can sneak past mental defenses and noise. In other words, the way we design and deliver our messages can become a Trojan Horse.
Comments (0)
DNC Phishing Scare Was a Training Exercise Gone Awry: Lessons Learned
October 02, 2018 Added by:Perry Carpenter
The recent phishing attack on the Democratic National Committee (DNC) was only a test conducted by the Michigan Democratic Party.
Comments (0)
Is User Training the Weakest Link for Your Email Security Approach?
June 28, 2018 Added by:Dennis Dillman
Security training and awareness should be at the top of your layered security strategy to ensure your employees are less of a liability, and the risk of a breach is significantly lower.
Comments (0)
The Five Secrets to Making Security Awareness Work in 2018
January 29, 2018 Added by:Perry Carpenter
Are you ready to make 2018 a break-out year for your security awareness program?
Comments (0)
Enterprises: Can You Handle 3,680 Phishing Emails per Week?
August 08, 2017 Added by:Kevin O'Brien
As the number of Business Email Compromise scams continues to grow, understanding whether a specific message is an attack requires fully integrated threat intelligence.
Comments (0)
When Is Apple.com Not Apple.com? Faked Punycode Domains Running Rampant
May 01, 2017 Added by:Magni R. Sigurdsson
We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.
Comments (0)
The Dark Side of the Force: Hacktivism Takes Center Stage in 2016
December 21, 2016 Added by:Dan Lohrmann
A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.
Comments (0)
Beyond Phishing: What You Need to Know About Whaling
June 13, 2016 Added by:Dan Lohrmann
Just when you thought you had seen it all regarding online phishing scams, along comes a new round of deceptive emails, phones calls, instant messages and even traditional printouts from your fax machine.
Comments (0)
Baiting the Phishermen: When Companies Strike Back at Scammers (Do Not Try This at Home)
May 16, 2016 Added by:Steven Rogers
It is never too late to remind employees about phishing emails and where to route suspicious finds.
Comments (0)
A Security Lesson from Down Under: Australia’s Banking App Malware Theft
April 20, 2016 Added by:Harvey Boulter
The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.
Comments (0)
March Madness Security Threats Can Drive Any Organization Mad!
March 14, 2016 Added by:Mark Parker
Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.
Comments (0)
SCADA Security: Phishing Season is Now Open
March 08, 2013 Added by:Eric Byres
Last week I received am email (shown further down on this page) purporting to be from the US Internal Revenue Service (IRS).
Comments (0)
Turkey – Another story on use of fraudulent digital certificates
January 04, 2013 Added by:Plagiarist Paganini
It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.
Comments (0)
False Flag Phishing
November 15, 2012 Added by:Alan Woodward
There is a form of phishing becoming more common on Twitter that is likely to fool even the most suspicious of users. I very nearly fell for it myself. What stopped me? Unlike me, the person who purportedly sent me the message doesn’t make the sort of spelling mistakes that were in the message...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider