Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Gold Galleon: Nigerian hackers target global maritime shipping businesses and their customers in BEC attacks [Read More]
Microsoft has rolled out a new Windows Defender Browser Protection extension to help Chrome users stay safe from malware and phishing websites. [Read More]
Trend Micro unveils Writing Style DNA, an AI-powered capability that uses writing style analysis to detect business email compromise (BEC) attacks [Read More]
Ransomware is the most prevalent type of malware and it increasingly targets business-critical systems, according to Verizon’s 2018 Data Breach Investigations Report (DBIR) [Read More]
Over 95% of the email domains managed by the Executive Office of the President (EOP) haven’t implemented the Domain Message Authentication Reporting & Conformance (DMARC) protocol. [Read More]
Ukrainian national suspected of being the mastermind of a gang that used Carbanak malware to steal more than €1 billion from banks arrested in Spain [Read More]
PhishMe has been acquired by private equity firms in a deal that valued the company at $400 Million, and changed its name to Cofense. [Read More]
A new business email compromise (BEC) campaign is targeting accounts payable personnel at Fortune 500 companies in an attempt to trick victims into initiating fraudulent wire transactions to attacker-controlled accounts, IBM warns. [Read More]
Proofpoint has agreed to acquire Wombat Security Technologies for $225 million in cash. [Read More]
Malware and phishing attacks growingly abuse SSL to increase their chances of success, Zscaler said in its latest report [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.