Tag "Phishing"

Back to homepage
Hardware/Network

A guide to cyber attacks: Denial of Service – Part 3

To conclude this 3-part series on cyber attacks, Information Age examines the various types of DoS within the cyber space. DoS is a more forceful method of cyber attack than

Identity Theft Software

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior

Software

A guide to cyber attacks: Phishing – Part 2

Information Age’s guide to cyber attacks continues with an examination of types of phishing attacksPhishing typically involves attackers obtaining a victim’s personal information. This can include log-in details and bank

Software

DNC Spots Phishing Attempt to Access Voter Database

The Democratic National Committee (DNC) has taken down a highly convincing phishing log-in page which appears to have been designed to give attackers access to the party’s voter database. The

Software

Midterm Election Hacking — Who Is Fancy Bear?

In era of fake news and disinformation, election hacking is rife. This week, software giant Microsoft announced it had taken down several fake websites allegedly created by hacking group Fancy Bear. It

Industry Insights Software

Real Security is a Question of Business Value

If you’re a CISO, you’ve probably wrestled with placing a monetary value on your exposure to cyber-attacks. For example, if your organization was breached thanks to a phishing campaign, how

Software

The Enigma of AI & Cybersecurity

We’ve only seen the beginning of what artificial intelligence can do for information security.  Alan Turing is famous for several reasons, one of which is that he cracked the Nazis’

Software

The Foundation of Cyber-Attacks: Credential Harvesting

Recent reports of a newly detected Smoke Loader infection campaign and the re-emergence of Magecart-based cyber-attacks illustrate a common tactic used by cyber criminals and state-sponsored attackers alike ― credential harvesting. According

Software

Email-Based Attacks a Growing Risk

Human beings have long been the weakest link in an organization’s security chain, largely because they so often fall victim to phishing campaigns, and a new report from Mimecast, State of Email

Cloud

Why the Cloud is Key to Mitigating the Menace of Phishing

After the rise of ransomware over the last few years (largely combatted through better detection of the malware and more attention paid to having decent backups), phishing has stormed back