Tag "Phishing"

Back to homepage
IT Compliance

Compliance and Data Privacy Regs that Affect IT Security

 GDPR is the latest compliance and data privacy reg to affect IT security. We list more than a dozen that may affect your organization – along with legal issues and


Why 2017’s Phishing Attacks Teach Us All to Beware – Infosecurity Magazine

At the end of 2016, we claimed it was the year that phishing went mainstream. Yet the first half of 2017 has seen the main ‘stream’ turned into a torrent.In


The three least effective enterprise security measures

Fifty-nine percent of respondents to a Bitglass survey at Black Hat USA 2017 identified phishing as the best data exfiltration strategy, as human error and ignorance will always be exploitable.Understandably,


Infosec weakest links: Negligent employees and poor password policies

54% of respondents to a Ponemon Institute study that involved more than 1,000 IT professionals said negligent employees were the root cause of a data breach.The study found that strong


Hackers exploit an undocumented Word feature to carry on attacks

Kaspersky researchers discovered a new attack technique leveraging Microsoft Word documents to gather information on users. The technique is innovative because it doesn’t use active content such as macros or


Five Steps To Securing Your Greatest Asset: Your Employees

Employees can be your biggest asset. If not managed properly, they can also be your weakest link. The trick lies in empowering them to do their jobs properly using the


Taking the Bait: Can You Resist an Email Phishing Attack? – IT SECURITY GURU

Email is a major weapon for cybercriminals and anyone wishing to penetrate an organisations cyber defences. Even nations are at risk. Recently a prankster using the moniker “Sinon Reborn” managed


User-targeted threats at all-time high despite rising education spend – Help Net Security

The cost of security education for large enterprises at an all-time-high of $290,033 per year per organization, and user education is rocketing up the CIO’s priority list. Yet despite those


Phishers targeting LinkedIn users via hijacked accounts – Help Net Security

A new phishing campaign has been spotted hitting LinkedIn users via direct messages and the LinkedIn InMail feature. They are sent from legitimate LinkedIn Premium accounts that have been hijacked


Billions of mobile, desktop and IoT devices exposed to BlueBorne AttackSecurity Affairs

Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new remote attack, even without any user interaction and pairing. The unique condition for BlueBorne