Tag "Phishing"

Back to homepage
Software

You Should Be Aware of These 10 Social Engineering Attacks

By Venu Rao, CEO and Founder  at WeSecureApp, Have you ever received an email with no text and just an attachment? We all know about social engineering attacks or at

Hardware/Network

How to Stop Advanced Persistent Threats

An advanced persistent threat can be as scary as it sounds. Gone undetected in an enterprise, these network breaches can lead to fraud, intellectual property theft or a headline-grabbing data

Software

The ultimate guide for businesses wanting to remove malware

So it happened. You don’t know where, when, and how, but it did – your device got infected with malware. Chances are, it slipped into your phone that one time

Software

Certain types of content make for irresistible phishes

A mature anti-phishing program keeps organizations safer, claims Cofense, and offers as proof the decreasing susceptibility of their customers’ employees to mock phishing emails as well as rising reporting rates

Software

Is there a patch for my users?

All it takes is one successful phishing email to persuade just one user to hand over their organizations login details. Once that hacker gains entry to your systems, you’re not

Software

The Challenge Of Insider Threats

Companies are not identifying Insider Threat blind spots according to the latest findings by Dtex Systems. The new report reveals that 90% of assessments discovered that negligent employees were transferring

Industry Insights

Rising Nation Cyber Attacks from Lebanon & the Netherlands

Optiv Security, the world’s leading security solutions integrator, has published its 2018 Cyber Threat Intelligence Estimate (CTIE) which details the current state of the cyber-threat landscape and uses estimative intelligence to predict

Software

Scamming the scammers

There is no absolute way to completely eradicate end users’ susceptibility to scams, but with constant care and diligence (coupled with technical measures), it’s possible to provide guidance to ensure

Software

Salted Hash – SC 01: What an Apple phishing attack looks like

Today on Salted Hash, we’re going to look at a phishing attack from two sides. The first side will be what the victim sees. After that, we’re going to see

Identity Theft

76% Of IT Security Breaches Are Motivated By Money First

These and many other fascinating insights are from the 11th edition of Verizon’s 2018 Data Breach Investigations Report. The report is available for download here (PDF, 68 pp., no opt-in).