Security Experts:

long dotted


Scammers are abusing YouTube as a new way to promote backdoored phishing templates and provide potential buyers with information on how to use the nefarious software, Proofpoint researchers warn. [Read More]
PhishEye from DomainTools is a Phishing protection solution designed to automate the process of identifying look-alike domains meant to spoof brand, product, or organization names. [Read More]
As new IPv4 addresses are more and more difficult to come by, spammers are increasingly hijacking existing IP address ranges for their nefarious purposes. [Read More]
Spam email volumes have increased significantly this year, being comparable to the record levels observed in 2010, mainly because of the increased activity of the Necurs botnet, Cisco Talos researchers believe. [Read More]
While these two reports mirror each other in the description of the current threat landscape, they actually come to two different conclusions. [Read More]
Gmail is now alerting Android users whenever they receive a message that can’t be authenticated with either Sender Policy Framework (SPF) or DKIM. [Read More]
Researchers have spotted a couple of new tricks used by cybercriminals to improve their phishing attacks [Read More]
German federal CERT (CERT-BUND) warned that malicious emails containing fake invoices as Word documents contain a personal salutation and business role of the receiver. [Read More]
Simulated phish training trains staff, it highlights staff who may need additional training, and it provides automatic 'training points' for staff who fail the test. [Read More]
Snapchat on Friday was targeted by a phishing attack that resulted in some payroll information of its employees being inadvertently revealed. [Read More]


rss icon

Jon-Louis Heimerl's picture
Organizationally, there are things you can do to help avoid becoming a victim, and to minimize damage if you are victimized.
Ram Mohan's picture
The semiannual “Global Phishing Survey” from the Anti-Phishing Working Group (APWG) provides powerful insight into what is happening in phishing worldwide.
Idan Aharoni's picture
Cooperation in the underground economy could enable a fraudster in Russia who masters the art of phishing to team up with another fraudster who already has the infrastructure of cashing out compromised online banking accounts of US banks.
Chris Hinkley's picture
Businesses usually don’t think about social engineering when securing company data. It used to be believed that social engineering was reserved for governments and organizations with enemies. That's not the case anymore.
Ram Mohan's picture
Domain name typo squatting, a decade-old headache for marketing and legal departments, is putting corporate data at risk. But evidence suggests that it is becoming a risk that also needs to be on the CSO's radar.
Irida Xheneti's picture
The risks are real, and growing more complex by the month. That doesn't mean you're powerless to keep your infrastructure and data secure.
Ram Mohan's picture
Cybercriminals have enough information to construct highly targeted phishing attacks. So, how can you mitigate the risk of falling victim to spear-phishing attacks?
Idan Aharoni's picture
Unlike real-world dumpster diving, "electronic dumpster diving" can enable cybercriminals to access all the documents currently held by the user, not just those that were thrown away.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Noa Bar-Yosef's picture
An Inside Look at Some of the Strategies and Tactics Cybercriminals Use to Conduct Successful Phishing Attacks