Please turn on your JavaScript for this page to function normally.
mask
Hackers impersonate women online to get into target corporate networks

By all (online) accounts, Mia Ash was a pretty and successful photographer based in London, and she was looking for friendship and love on the Internet. Her LinkedIn account …

User
Every organization is only one click away from a potential compromise

Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for …

eye
Assessing the habits and tactics of organized credit card fraud gangs

By analyzing hundreds of criminal forums, Digital Shadows discovered a new trend in the form of remote learning ‘schools’. Available to Russian speakers only, these six-week …

bomb
New PowerPoint malware delivery technique tested by spammers

A spam run detected by several security companies has attempted to deliver malware through an innovative technique: a link in a PowerPoint slideshow. The attack unfolds like …

thumb up
Why people are at the heart of your information security success

In this podcast, Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, talks about the human side of security. Are humans the weakest link? Why do people fall for …

email
Majority of workers blindly open email attachments

The vast majority (82 percent) of users open email attachments if they appear to be from a known contact, despite the prevalence of well-known sophisticated social engineering …

IRS
Tax season security tips: Protect yourself from cybercrime

Between December 2016 and February 2017, IBM X-Force researchers saw a 6,000 percent increase in tax-related spam emails. The researchers see this increase and other factors …

UK map
UK residents hit with extremely personalized scam emails

A compelling and potentially very successful email spam campaign is being leveraged against UK residents, warns Sophos researcher Paul Ducklin. The email addresses the …

Eyes
Targeted attack prevention in cloud email and messaging systems

GreatHorn announced the launch of the GreatHorn Threat Platform (GTP) at RSA Conference 2017. The Threat Platform extends the capabilities of the company’s cloud-native …

Netflix
Picky ransomware targets specific subset of would-be Netflix users

Aspiring Netflix users who don’t want to actually pay for the popular video on demand service are being targeted with a new type of ransomware. Detected as Netix by …

fish phishing
Phishers’ new social engineering trick: PDF attachments with malicious links

It is – or it should be – a well known fact that attackers occasionally email potential victims with PDF attachments containing malware or exploit code. But the …

Eyes
65% of social engineering attacks compromised employee credentials

Social engineering is having a notable impact on organizations across a range of industrial sectors in the US. In fact, 60 percent of surveyed security leaders say their …

Don't miss

Cybersecurity news