phishing
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102617/phishing-400x200.jpg)
The long tail of phishing attacks
Targeted phishing has become the single most effective attack type in the world today. Phishing attacks have been the root cause of the majority of the large-scale data …
![iPhone 8](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102600/iphone8-400x200.jpg)
The tools criminals use to prepare a stolen iPhone for resale
Reselling stolen mobile phones is a lucrative business all over the globe, and iPhones are very much in demand. Whether lost or stolen, the iPhones are often locked by their …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112853/password-400x200.jpg)
Phishing is a greater threat to users than keyloggers and third-party breaches
When it comes to loosing access to their accounts, phishing is a greater threat to users than keyloggers and third-party breaches, researchers have found. How many valid …
![Netflix](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194429/netflix-400x200.jpg)
Artful Netflix-themed phishing campaign can fool many
A recently spotted Netflix-themed phishing email campaign is so well crafted that it’s difficult for many less tech-savvy users to spot the scam. Extremely convincing …
![mobile work](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102737/mobile_work-400x200.jpeg)
The mobile workforce: Productive, but susceptible to data compromise
An enterprise’s biggest problem when it comes to data compromise isn’t just technologies that are vulnerable, it’s how their employees use technology. Digital transformation, …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Researchers analyze 3,200 unique phishing kits
Most phishing sites are quickly detected and access to them is blocked, but not matter how fast the “takedown” happens, the number of victims is still large enough …
![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102836/google-play-fake-crypto-400x200.jpg)
Beware fake Android cryptocurrency trading apps on Google Play
Two phishing apps that were made to look like the official app of popular cryptocurrency exchange Poloniex have been booted off Google Play after ESET researchers notified …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Cybercriminals focus on the shipping and cloud storage sectors
The Anti-Phishing Working Group’s latest report found upticks in phishing attacks against companies in the Logistics & Shipping as well Cloud Storage & File …
![Google security](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103613/google_security-400x200.jpg)
Google offers Advanced Protection for high-risk users of its services
High-risk Google users – journalists, human rights and civil society activists, but also campaign staffers and people in abusive relationships – can now take …
![iOS 11](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103110/ios11-devices-400x200.jpg)
Apple’s intermittent password prompts prime iOS users for phishing
By asking iOS users to enter their AppleID password intermittently and with no regard of environment, Apple has laid the groundwork for phishers to go after the sought-after …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103303/office365-400x200.jpg)
KnockKnock campaign targets Office 365 corporate email accounts
Researchers uncovered KnockKnock, an attack on Office 365 Exchange Online email accounts, originating from 16 countries around the world and targeted organizations in …
![cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103021/cybersecurity-400x200.jpg)
Activists targeted with barrage of creative phishing attempts
More often than not, the human element is the weakest link in the security chain. This fact is heavily exploited by cyber attackers, and makes phishing and spear-phishing …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints