Tag "Scams"

Back to homepage
Software

Phishing attempts increase 400%, many malicious URLs found on trusted domains

1 in 50 URLs are malicious, nearly one-third of phishing sites use HTTPS and Windows 7 exploits have grown 75% since January. A new Webroot report also highlights the importance of user

Artificial Intelligence

Using Biometrics, Intelligent Security To Keep Finances Safe

Fort Knox is no longer the gold standard when it comes to financial security. And with passwords becoming increasingly passé (not to mention an absolute nuisance), a new wave of

Software

Employment phishing lures pose a big threat to jobseekers’ current organisations

Online employment is fertile ground for social engineering and phishing attacks – watch out for these. Job hunting is demanding of your time, energy, and mental capacity, no matter what

Expert Articles Network Security

Your IT is too Slow for Faster New Phishing Scams

By Atif Mushtaq – CEO at SlashNext, Successful phishing attacks depend on a quick response from users – and it’s working all too well. While many employees have some form

Software

Threat actors are doing their homework, researchers identify new impersonation techniques

There is an increase in three main areas: spoofed phishing attempts, HTTPS encryption in URL-based attacks, and cloud-based attacks focused on publicly hosted, trusted file-sharing services, FireEye found, after analyzing

Software

Why phishing education has never been more critical to your business

Our cyber defenses are becoming stronger and stronger every year. Even the smallest companies can now deploy advanced anti-malware and intrusion detections tools that were, until recently, only within the

Software

Why phishing education has never been more critical to your business

Our cyber defenses are becoming stronger and stronger every year. Even the smallest companies can now deploy advanced anti-malware and intrusion detections tools that were, until recently, only within the

Software

What will phishers do once push-based MFA becomes widely used?

As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a no-brainer for most companies.

Expert Articles

Social Engineering: A Threat to Social Networking

By Arpit Jain, Cyber Security Engineer at NetWeb Software, Social engineering is a popular hacking technique with wide range of spiteful activities practiced through human interactions. It uses psychological manipulation

Identity Theft

Don’t Get Caught in a SMiShing Scam

The word ‘SMiShing’ may sound like gibberish — we think it’s a weird one — but some of the world’s largest enterprises are losing millions of dollars to these scams every year.