Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A recently observed phishing campaign is targeting PayPal users with fake pages that are well designed and difficult to distinguish from the real ones, ESET researchers warn. [Read More]
The number of data breaches disclosed in the United States increased by 40 percent in 2016 compared to the previous year, said ITRC and CyberScout [Read More]
Unpatched vulnerabilities in the McDonald’s website expose user passwords to phishing attacks [Read More]
Gmail phishing attack: cybercriminals use cleverly designed URLs and they immediately access the hacked accounts [Read More]
The EyePyramid malware used to spy on important people in Italy is not very sophisticated, but it still allowed attackers to steal a lot of sensitive data for a long time [Read More]
A recently detected phishing campaign designed to steal credit card information employed a series of attack tactics previously associated with malware distribution. [Read More]
"Hailstorm" spam campaigns have evolved from sending a low number of messages for long periods of time to sending a high volume of emails over a short time span, [Read More]
A new phishing attack targeting Office 365 business email users was found using Punycode to go undetected by both Microsoft’s default security and desktop email filters. [Read More]
Scammers are abusing YouTube as a new way to promote backdoored phishing templates and provide potential buyers with information on how to use the nefarious software, Proofpoint researchers warn. [Read More]
PhishEye from DomainTools is a Phishing protection solution designed to automate the process of identifying look-alike domains meant to spoof brand, product, or organization names. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.
Jon-Louis Heimerl's picture
What do you do when your organization has been victimized by a phishing attack? If you wait until you are actually under an attack it is too late.