Tag "Phishing"

Back to homepage
Software

Phishing Training is a Tool, Not a Solution

If You Find Yourself Frequently Blaming Users for Successful Attacks, You Know Your Security is Not Working.  Training users to recognize phishing is a best practice, an important “tool in

Mobile Software

WhatsApp: Newest Attack Target for Mobile Phishing

Phishing attacks aren’t nearly as successful as they used to be because by now people have learned to look out for the emails that ask them to provide sensitive details.

Software

Understanding the art of phishing

The goal is to trick the recipient into believing the email is genuine, with the intention of getting the target to either download malware, or hand over personal information.Using cyber-attacks

Software

Beware Phishing Attacks With Multiple Replica Sign-Ins

With multi-layer cybersecurity defenses improving, hackers are going to the human attack surface with social engineering and phishing attacks like never before. According to industry reports, over 90 percent of

Software

Signing Up for Benefits? Beware of Phishing Attacks

In addition to being National Cyber Security Awareness Month (NCSAM) in the US, October also marks the beginning of a lucrative two-month phishing season. Over the next two months, the

Software

The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion

The Necurs botnet, a large and well-known spam originator, has become synonymous with cybercrime. Its spam-sending capabilities, through a botnet of a few million infected devices, are frequently dedicated to

Industry Insights

Top cybersecurity facts, figures and statistics for 2018

Looking for hard numbers to back up your sense of what’s happening in the cybersecurity world? We dug into studies and surveys of the industry’s landscape to get a sense

Software

Cryptomining dethrones ransomware as top threat in 2018

Based on trends in the first half of 2018, Webroot found that cybercriminals are shifting to increasingly sophisticated and targeted means of attack while also expanding their money making endeavors,

Software

Hook, Line and Sinker: After Phish Get Caught

Phishing is nearly as old as email, but it is still a major attack vector for cybercriminals. Some of the most prominent cyber incidents of the past few years are

Network Security

Has your corporate network been weaponised? Island hopping can compromise your brand and your country

By Rick McElroy – Security Strategist at  Carbon Black Since the dawn of the internet geopolitical tension has been the harbinger of increased cyberattacks. Over the years we have witnessed