Please turn on your JavaScript for this page to function normally.
Door
Hackers hosted tools on a Stanford University website for months

Compromising legitimate websites and the web servers that store and deliver them is a time-honoured tactic of opportunistic hackers, and a failure to keep them out can result …

phishing
Analyzing phishing attacks against 500,000 mailboxes at 100 organizations

Phishing has evolved from a mere nuisance into a global epidemic in which organizations of all sizes and across all industries are being negatively impacted at high frequency. …

https
Number of HTTPS phishing sites triples

When, in January 2017, Mozilla and Google made Firefox and Chrome flag HTTP login pages as insecure, the intent was to make phishing pages easier to recognize, as well as push …

DocuSign
DocuSign breached, stolen info used for targeted phishing campaign

Phishing emails impersonating electronic signature technology provider DocuSign are not an unusual sight, but the latest campaign has the added advantage of specifically …

Google
Spectacular phishing attack pushes Google to improve defenses

The most recent Google-themed phishing attack shouldn’t have come as a surprise, but it did – and has affected around a million Gmail users. As Google succinctly …

email
Majority of workers blindly open email attachments

The vast majority (82 percent) of users open email attachments if they appear to be from a known contact, despite the prevalence of well-known sophisticated social engineering …

target
Brands increasingly targeted by false websites and phishing

DomainTools released the names of the top U.S.-based retail companies whose brands are frequently abused by criminals creating look-alike domains for phishing. The research …

lips
Battling cyber security’s human condition

There is no silver bullet when it comes to cyber security. Organizations with multi-million dollar IT budgets still make headlines for being successfully breached, and even …

danger
Know your enemy: Defining the new taxonomy of malicious emails

Just as it is the default tool for most businesses, email’s capacity for rapid, mass communication has made it a favourite instrument of criminals. As a result, malicious …

architecture
Cybercrime can come in any shape or size, and not always the form you’d expect

Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much …

bomb
Phishing attacks responsible for three-quarters of all malware

With phishing now widely used as a mechanism for distributing ransomware, a new NTT Security reveals that 77% of all detected ransomware globally was in four main sectors – …

Android
Flashlight app on Google Play delivered highly adaptable banking Trojan

A modified version of the Charger mobile ransomware has been downloaded from Google Play by up to 5,000 users. This new variant of the malware was shipped inside a …

Don't miss

Cybersecurity news