Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

Microsoft patches 62 vulnerabilities, including a critical Office zero-day exploited to deliver data-stealing malware [Read More]
Attackers inject themselves into ongoing email exchanges in highly targeted spear-phishing attacks aimed at entities around the world [Read More]
EFF warns of sophisticated spear-phishing attacks targeting Internet freedom NGOs “Fight for the Future” and “Free Press” [Read More]
According to a new report, an average of 1.385 million unique new phishing sites are created every month, peaking at 2.3 million in May 2017. [Read More]
Equifax advised victims of the recent breach on Twitter to access a fake support website instead of equifaxsecurity2017.com [Read More]
Iranian hackers target aerospace and energy organizations in the US, Saudi Arabia and South Korea [Read More]
DMARC effectively whitelists the genuine emails from genuine domains, so that ISPs and receiving organizations (such as universities) can reject or block spoofed mails. [Read More]
Security researchers have proposed a methodology for effectively detecting credential spear-phishing attacks in corporate networks while achieving a very low number of false positives. [Read More]
A Paris-based malware researcher known as Benkow has discovered more than 700 million records used by the Onliner spambot on a misconfigured server. [Read More]
Facebook awards Internet Defense Prize of $100,000 to researchers who described a novel method for detecting spear-phishing in enterprises [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.
Jon-Louis Heimerl's picture
For a month, I kept all of my spam, then looked at the subject matter, where it was from and tried to analyze some additional characteristics of the spam.
Jon-Louis Heimerl's picture
Social engineering attacks can happen at any time. Here are some strategies you can use to help reduce the chances of a successful social engineering/phishing attack you or your organization.