phishing
91% of phishing attacks are display name spoofs
GreatHorn analyzed more than 56 million emails from 91,500 corporate mailboxes from March to November 2016. The data found that display name spoofs are the clear phishing …
Phishers’ new social engineering trick: PDF attachments with malicious links
It is – or it should be – a well known fact that attackers occasionally email potential victims with PDF attachments containing malware or exploit code. But the …
Researchers predict upsurge of Android banking malware
Android users, beware: source code and instructions for creating a potent Android banking Trojan have been leaked on a hacker forum, and researchers are expecting an onslaught …
New Gmail phishing technique fools even tech-savvy users
An effective new phishing attack is hitting Gmail users and tricking many into inputing their credentials into a fake login page. How the attack unfolds The phishers start by …
Brother and sister arrested for spying on Italian politicians for years
Two Italian siblings have been arrested on Monday and stand accused of having spied on Italian politicians, state institutions and law enforcement agencies, businesses and …
Record wave of phishing comes to an ebb in autumn 2016
The Anti-Phishing Working Group reports that the year’s record wave of phishing subsided in the autumn. According to the APWG’s new Phishing Activity Trends Report, the total …
Consumers worry more about cybercrime than physical crime
Consumers are more worried about cybercrime than physical world crime, according to Sophos. The survey polled 1,250 consumers in the US, UK, Germany, Austria and Switzerland. …
Risky sites have never been easier to exploit
46% of the Internet’s top 1 million web sites, as ranked by Alexa, are risky. This is largely due to vulnerable software running on web servers and on underlying ad …
Corporate Office 365 users hit with clever phishing attack
Corporate Office 365 users are being targeted by phishers using a clever new trick to bypass email filters and the default security protections of the Microsoft service. The …
12 tips for implementing secure business practices
Optiv Security shared a list of a dozen tips for implementing secure business practices during the 2016 holiday season. Security experts developed these recommendations to …
Over 400,000 phishing sites have been observed each month during 2016
84 percent of phishing sites observed in 2016 existed for less than 24 hours, with an average life cycle of under 15 hours. The data collected by Webroot shows that …
65% of social engineering attacks compromised employee credentials
Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …
Featured news
Resources
Don't miss
- The modern CISO is a cornerstone of organizational success
- Best practices for ensuring a secure browsing environment
- Kata Containers: Open-source container runtime, building lightweight VMs
- Why software is the key to FI risk management
- Hottest cybersecurity open-source tools of the month: December 2024