Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

The official website of kitchen products maker Tupperware was hacked and the attackers planted malicious code designed to steal visitors’ payment card information. [Read More]
University of Utah Health revealed last week that it discovered unauthorized access to some employee email accounts, along with a malware infection on one of its workstations. [Read More]
Most ransomware is deployed after hours, and usually several days after the initial compromise, newly published research from FireEye reveals. [Read More]
It may look like an email from a supervisor with an attachment on the new "work from home policy." But it could be a cleverly designed scheme to hack into your network. [Read More]
Akamai discovered 1,221 active phishing domains by using its CDN logs to identify users that were redirected from phishing landing pages. [Read More]
Facebook has sued domain registrar Namecheap over its refusal to provide information on tens of domains that impersonated the social media company. [Read More]
Researchers say there are over 600 legitimate Microsoft subdomains that can be hijacked and abused for phishing, malware delivery and scams. [Read More]
What started as almost casual research in November 2019 and disclosed to various vendors as a vulnerability, was abruptly reclassified and treated as a zero-day vulnerability on February 13, 2020. [Read More]
Puerto Rico’s government has suspended three employees as federal agents investigate an online scam that attempted to steal more than $4 million from the U.S. territory. [Read More]
Puerto Rico’s government has lost more than $2.6 million after falling for an email phishing scam, according to a senior official. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.
Johnnie Konstantas's picture
While most of us aren’t asking for it, chances are high that we, too, have been—or will become—victims of a cyber attack.
Alastair Paterson's picture
While you may understand the risks that come from the use of social media, what options do you have to protect your organization against them?
Bill Sweeney's picture
As data moves online, social engineering techniques have become far more personalized, technologically advanced and ultimately successful.
James Foster's picture
Monitoring social media is a daunting task. Enterprises must have risk management plans in place to monitor, identify, combat and remediate social media-based threats.
Torsten George's picture
For all the benefits that social media networks provide, organizations must recognize that they present a double-edged sword when it comes to security.
Marc Solomon's picture
Many continue to click on links or attachments sent via email without taking any steps to verify the origin of the email or the validity of the link or attachment. It only takes one click to for an attacker to establish a foothold in the target’s systems.