Tag "Phishing"

Back to homepage
Software

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical

Software

Phishing: The future is zero tolerance

Phishing has long been the proverbial thorn in an organization’s side. It doesn’t have the glitz and glamor of many other headline-grabbing hacks, such as the latest zero-day or ransomware

Industry Insights

Should My Employees Receive Cybersecurity Training?

Cybersecurity training has quickly become extremely important for businesses. Employees don’t need to be cybersecurity experts, but they should be practicing healthy cyber habits.  New-hire training and regularly scheduled refresher

Software

Email security predictions: What we can expect in 2019

2018 shed a lot of light on how expensive successful phishing attacks can be, with the FBI reporting in July well over $12B in financial losses due to business email compromise and

Software

Phishing Template Uses Fake Fonts

A unique phishing template using fake fonts to evade detection and to better steal user credentials for a major US bank has been discovered, according to new research from Proofpoint. Researchers identified what they

Industry Insights

Tax Fraud: Scammers Ramp Up Their Tactics in 2019

As the IRS cracks down on tax refund fraud, scammers will be innovating new ways to scheme taxpayers out of their hard-earned money this year. This tax season no one

Software

Evasive Malware, Meet Evasive Phishing

In a previous column, I wrote about how evasive malware has become commoditized and described how the techniques being used in any given piece of malware had grown in number and sophistication—the

Software

Success is in the Scoping: Incorporating Penetration Testing into Your Cybersecurity Planning

If you’re considering incorporating penetration testing into your cybersecurity planning process, there are some key considerations to keep in mind when you’re figuring out exactly what’s ‘in scope’ — what

Software

How to Use Multi-Factor Authentication When You Don’t Have Cell Phone Access

Many security-minded businesses use multi-factor authentication to verify customers’ identities. The most familiar method is to send customers a code by SMS text message, which the customer then enters on

Software

Scammers target Netflix users in a new phishing campaign to steal personal data

The US’ Federal Trade Commission (FTC) is warning the Netflix users about a new phishing scam that involves cybercriminals stealing users’ personal and payment card information. The scam involves cybercriminals