Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The crash of the Malaysia Airlines flight MH17 in eastern Ukraine on June 17 continues to make headlines, making it a perfect event for cybercriminals to leverage in their malicious campaigns. [Read More]
According to research, financial institutions, payment services and social networks are among the categories of sites most likely to be used in phishing attacks. [Read More]
According to a report from Imperva, 80% of the traffic associated with comment spam is generated by just 28% of attack sources. [Read More]
The new anti-phishing feature currently being tested in the experimental version of Google Chrome does not work as well as intended and poses security risks. [Read More]
Cisco issued an alert for five separate buffer overflow security flaws that exist in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players. [Read More]
Mining companies, government agencies and manufacturing firms were hit hard by phishers in 2013, with one in three such organizations suffering at least one attack. [Read More]
Cybercriminals are settling into a comfortable place in the "Dark Web" where they test, refine and distribute malware for online thievery. [Read More]
Google has quietly acquired Redwood City, California-based Impermium, a company that protects SaaS application users from account hijacking and account compromise. [Read More]
A Ponemon study found that 75% of the respondents identified mobile devices such as smart phones as "the greatest risk of potential IT security risk within the IT environment." [Read More]
The free Windows tool is actually a data-theft Trojan capable of stealing log-in credentials and bitcoins. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Chris Hinkley's picture
Businesses usually don’t think about social engineering when securing company data. It used to be believed that social engineering was reserved for governments and organizations with enemies. That's not the case anymore.
Ram Mohan's picture
Domain name typo squatting, a decade-old headache for marketing and legal departments, is putting corporate data at risk. But evidence suggests that it is becoming a risk that also needs to be on the CSO's radar.
Irida Xheneti's picture
The risks are real, and growing more complex by the month. That doesn't mean you're powerless to keep your infrastructure and data secure.
Ram Mohan's picture
Cybercriminals have enough information to construct highly targeted phishing attacks. So, how can you mitigate the risk of falling victim to spear-phishing attacks?
Idan Aharoni's picture
Unlike real-world dumpster diving, "electronic dumpster diving" can enable cybercriminals to access all the documents currently held by the user, not just those that were thrown away.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Noa Bar-Yosef's picture
An Inside Look at Some of the Strategies and Tactics Cybercriminals Use to Conduct Successful Phishing Attacks
Noa Bar-Yosef's picture
Second column in a series describing the hottest commodities found in underground markets. We continue to explore the trending “commodities” in these markets and how to protect from your data being exchanged in these markets.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!