Blog Posts Tagged with "Phishing"


The Five Secrets to Making Security Awareness Work in 2018

January 29, 2018 Added by:Perry Carpenter

Are you ready to make 2018 a break-out year for your security awareness program?

Comments  (0)


Enterprises: Can You Handle 3,680 Phishing Emails per Week?

August 08, 2017 Added by:Kevin O'Brien

As the number of Business Email Compromise scams continues to grow, understanding whether a specific message is an attack requires fully integrated threat intelligence.

Comments  (0)


When Is Not Faked Punycode Domains Running Rampant

May 01, 2017 Added by:Magni R. Sigurdsson

We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.

Comments  (0)


The Dark Side of the Force: Hacktivism Takes Center Stage in 2016

December 21, 2016 Added by:Dan Lohrmann

A new world of hacking motivations and causes is starting to develop — along with convenient, easy-to-use tools for computer novices to do many dangerous things online.

Comments  (0)


Beyond Phishing: What You Need to Know About Whaling

June 13, 2016 Added by:Dan Lohrmann

Just when you thought you had seen it all regarding online phishing scams, along comes a new round of deceptive emails, phones calls, instant messages and even traditional printouts from your fax machine.

Comments  (0)


Baiting the Phishermen: When Companies Strike Back at Scammers (Do Not Try This at Home)

May 16, 2016 Added by:Steven Rogers

It is never too late to remind employees about phishing emails and where to route suspicious finds.

Comments  (0)


A Security Lesson from Down Under: Australia’s Banking App Malware Theft

April 20, 2016 Added by:Harvey Boulter

The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.

Comments  (0)


March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)


SCADA Security: Phishing Season is Now Open

March 08, 2013 Added by:Eric Byres

Last week I received am email (shown further down on this page) purporting to be from the US Internal Revenue Service (IRS).

Comments  (0)


Turkey – Another story on use of fraudulent digital certificates

January 04, 2013 Added by:Pierluigi Paganini

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web properties. Using the certificate it is possible to spoof content in a classic phishing schema or perform a man-in-the-middle attack according Google Chrome Security Team and Microsoft experts.

Comments  (0)


False Flag Phishing

November 15, 2012 Added by:Alan Woodward

There is a form of phishing becoming more common on Twitter that is likely to fool even the most suspicious of users. I very nearly fell for it myself. What stopped me? Unlike me, the person who purportedly sent me the message doesn’t make the sort of spelling mistakes that were in the message...

Comments  (0)


MS-ISAC Meeting Explores Advanced Persistent Threats

August 22, 2012 Added by:Headlines

The event brought together state Chief Information Security Officers and other cyber security professionals from the nation's state, local and territorial governments, along with representatives from the U.S. Department of Homeland Security and industry experts for briefings on current cyber threats...

Comments  (1)


Online Threats That Will Throw You Off the Security Balance Beam

August 09, 2012 Added by:Kelly Colgan

We can’t sugarcoat it, because there’s more at stake for online users than going for gold or settling for silver. One blip on the beam or pratfall on the pommel can make a bank-account balance drop faster than an icy judge’s score. And it’ll take more than a Wheaties box to build it back...

Comments  (0)


Georgia Man Convicted for Role in Phishing Operation

July 03, 2012 Added by:Headlines

Osarhieme Uyi Obaygbona, 32, of Atlanta, Georgia, was convicted last week of conspiracy to commit wire fraud, conspiracy to commit identity theft, and conspiracy to gain unauthorized access to protected computers. Phishing attacks use fraudulent web pages that mimic the legitimate web pages...

Comments  (0)


Alert: Fake FBI Emails Seek Personal Information

June 26, 2012 Added by:Headlines

The fraudulent e-mails give the appearance of legitimacy due to the use of pictures of the FBI Director, seal, letterhead, and/or banners. The schemes cover a range from threat and extortion e-mails, website monitoring containing malicious computer program attachments (malware), and online auction scams...

Comments  (0)


Mobiles and Phishing – Why They're More Dangerous

June 14, 2012 Added by:Robert Siciliano

SMiShing is a version of phishing in which scammers send text messages. The best protection from this scam is awareness. Once you understand how it works, you are better positioned to recognize mobile phishing, and how to avoid clicking links within emails or text messages and otherwise responding to such ruses...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »
Most Liked