Tag "Spear Phishing"

Back to homepage
Expert Articles Software

SOAR vs. Security Operations: What’s Really Going On?

By John Czupak – CEO at ThreatQuotient, There’s something big brewing in the world of security operations, but what exactly is it? We are regularly inundated with various descriptions of

Software

Five examples of user-centered bank fraud

In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most banking platforms were not designed securely and

Software

The impact of spear phishing on organizations and how to combat this growing threat

In this Help Net Security podcast, Scott Olson, the VP of Product Marketing at iovation, talks about the impact of spear phishing, and offers practical suggestions on how to prevent

Software

What is spear phishing? Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical

Software

How hackers exploit critical infrastructure

The traditional focus of most hackers has been on software, but the historical focus of crime is on anything of value. It should come as no surprise, therefore, that as

Software

Email attacks still biggest threat to UK businesses

Growing cost of email attacks linked to increasing risk of employee behaviour. Email is still the number one threat factor among businesses, with four in five suffering an attack in

Software

Authentication is imperfect, but passwords are not going away

As a hacker, I found vulnerabilities like easy-to-guess passwords made my work much easier. If that attack vector didn’t pan out, I could usually get around the authentication flow, or

Software

Digital Literacy: Time To Shape Up Or Ship Out

When Michigan’s state administration staged a phishing trip using an email supposedly about expired passwords as part of a security audit among users of its computer network, the results were

Software

Phishing Via Social Media Up 100 Percent, Now A Preferred Vector

The most interesting trend to surface in Q4 of RiskIQ’s phishing report was a 100 percent increase in phishing campaigns leveraging social media platforms, accounting for 20 percent of the

Software

AI technologies could boost capabilities of hackers

For many firms, the advent of artificial intelligence will lead to groundbreaking possibilities in a host of fields. However, cyber threat actors can also use this technology to cause havoc