Tag "Phishing"

Back to homepage
Software

Current phishing defense strategies and execution are not hitting the mark

Few professionals are completely confident in their ability to assess the effectiveness of their phishing awareness efforts. In a new paper, Phishing Defense and Governance, released in partnership with Terranova

Industry Insights

Is it time we raised expectations of politicians on cyber security?

Given the public perception that politicians are a bit clueless on tech/security issues, UK-based cyber security/ethical hacking firm Redscan decided to poll all 650 UK MPs to understand their thoughts

Software

How susceptible are hospital employees to phishing attacks?

Cybersecurity threats are a rising problem in society, especially for healthcare organizations. Successful attacks can jeopardize not only patient data but also patient care, leading to cancellations and disruptions in

Software

Healthcare organizations are battling phishing

(Reuters Health) – Many healthcare organizations remain vulnerable to phishing attacks, a new study finds. When researchers sent simulated phishing emails, nearly one in seven of the messages were clicked

Software

The impact of spear phishing on organizations and how to combat this growing threat

In this Help Net Security podcast, Scott Olson, the VP of Product Marketing at iovation, talks about the impact of spear phishing, and offers practical suggestions on how to prevent

Software

Phishing Attacks Evolve as Detection & Response Capabilities Improve

Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change.The growing sophistication of tools and techniques for protecting people against phishing

Software

Enterprises are blind to over half of malware sent to their employees

As the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible because SSL

Software

40% of malicious URLs were found on good domains

While tried-and-true attack methods are still going strong, new threats emerge daily, and new vectors are being tested by cybercriminals, according to the 2019 Webroot Threat Report. Click here to view original

Software

Businesses need to rethink security priorities due to shifting trends

One shift in attacks that businesses should be aware of is the rapid growth of cryptocurrency mining, which increased 237 percent, according to the 2018 Security Roundup Report by Trend Micro. Overall,

Software

Enterprises are blind to over half of malware sent to their employees

As the use of SSL grows to the point where it’s the standard protocol, cybercriminals are increasingly using encryption to conceal and launch attacks. This has become possible because SSL