Phishing
Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment
December 11, 2017 Added by:Perry Carpenter
As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?
Comments (0)
Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks
November 07, 2017 Added by:Asaf Cidon
Artificial intelligence to stop spear phishing sounds futuristic and out of reach, but it’s in the market today and attainable for businesses of all sizes, because every business is a potential target.
Comments (0)
Convenience Comes at a Steep Price: Password Management Systems & SSO
July 12, 2017 Added by:Alexandre Cagnoni
Many consumers and businesses are flocking to the mirage of safety offered by password management firms, which are only as strong as their weakest link (often humans).
Comments (0)
Make Sure We're Using the Same Language
June 27, 2017 Added by:Jay Kelley
Punycode (a way to represent various non-ASCII characters) can be used for malicious purposes, as a Chinese researcher discovered earlier this year.
Comments (0)
When Is Apple.com Not Apple.com? Faked Punycode Domains Running Rampant
May 01, 2017 Added by:Magni R. Sigurdsson
We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.
Comments (0)
Stop the Phishing Frenzy; Arm Against the Danger with Detection and Response
December 23, 2016 Added by:Gary Southwell
Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.
Comments (0)
Beyond Phishing: What You Need to Know About Whaling
June 13, 2016 Added by:Dan Lohrmann
Just when you thought you had seen it all regarding online phishing scams, along comes a new round of deceptive emails, phones calls, instant messages and even traditional printouts from your fax machine.
Comments (0)
Baiting the Phishermen: When Companies Strike Back at Scammers (Do Not Try This at Home)
May 16, 2016 Added by:Steven Rogers
It is never too late to remind employees about phishing emails and where to route suspicious finds.
Comments (0)
A Security Lesson from Down Under: Australia’s Banking App Malware Theft
April 20, 2016 Added by:Harvey Boulter
The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.
Comments (0)
Protecting Yourself (and Your Organization) from Ransomware
April 04, 2016 Added by:Dan Lohrmann
While media attention has focused on global terrorist incidents and the presidential primaries, a growing number of business emergencies caused by ransomware are sweeping the world. The risk of this situation escalating into a significant public- or private-sector crisis is growing.
Comments (0)
March Madness Security Threats Can Drive Any Organization Mad!
March 14, 2016 Added by:Mark Parker
Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.
Comments (0)
Yes. The World Needs More Security Predictions
February 17, 2016 Added by:Dan Lohrmann
With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...
Comments (0)
What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?
December 21, 2015 Added by:Dan Lohrmann
Beyond cyber war and the good guys having the right tools to catch the bad guys, there can be a tendency to ignore “more mundane” acceptable use directives. That is, security staff can download copyrighted material (movies and games), view porn at work, look at information that is private (like promotions, raises or other data from management), “borrow” passwords or delete log files to cov...
Comments (0)
Managing Security Resources: It’s All About People and Awareness (Part II)
December 07, 2015 Added by:Steve Durbin
As information risks and cyber security threats increase, organizations need to move away from reacting to incidents and toward predicting and preventing them. Developing a robust mechanism to assess and treat information risk throughout the organization is a business essential.
Comments (0)
Get Physical with your Physical Space
August 17, 2015 Added by:Jayson Wylie
Current social engineering practice has gone beyond mail phishing scams and there is high probability that there is potential of a malicious presence in the mix within the place of work.
Comments (0)
Hackers and Threats: Cybercrime Syndicates Go Global
August 04, 2015 Added by:Steve Durbin
Organizations are struggling to cope with the quantum speed and sophistication of global cyber-attacks being carried out by organized cyber-criminal syndicates. Moving forward, businesses need to prepare to be targeted at any time, and any place, by multiple assailants. Organizations that wish to keep pace with these developments, and remain financially viable, need to take action now, or face the...
Comments (0)
- Non-Malware Attacks: What They Are and How to Protect Against Them?
- SAP Cyber Threat Intelligence Report – April 2018
- Cloud Security Alert – Log Files Are Not the Answer
- Avoiding Holes in Your AWS Buckets
- The Three Great Threats to Modern Civilization
- 2020 Vision: How to Prepare for the Future of Information Security Threats
- Why Data Loss Prevention Will Suffer the Same Fate as Anti-Virus
- Unconventional Thinking — Four Practices to Help Mitigate Risk
- The Night the Lights Went out in Georgia (Almost)
- Is Blockchain Really Disruptive in Terms of Data Security?