Social Engineering

71fd135c31a6d0bc64f3b46c190a4590

How Can Businesses Protect against Phishing Attacks on Employee Smartphones?

October 11, 2018 Added by:Matt Johnson

It is vital that business leaders educate themselves on the types of attacks that today’s scammers are using, and advise employees on how best to protect themselves.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

DNC Phishing Scare Was a Training Exercise Gone Awry: Lessons Learned

October 02, 2018 Added by:Perry Carpenter

The recent phishing attack on the Democratic National Committee (DNC) was only a test conducted by the Michigan Democratic Party.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Changing Security Behaviors Via a Top Down Approach

August 02, 2018 Added by:Perry Carpenter

When it comes to changing behaviors and building better security hygiene, the role of the leader is not only critical, but it is the impetus to change.

Comments  (0)

211571f3e14099fd9a6c172426982ca5

Creating a Meaningful Security Awareness Training Program Is a 12-Month Commitment

December 11, 2017 Added by:Perry Carpenter

As an industry, do we do ourselves a disservice with National Cybersecurity Awareness Month (NCAM)?

Comments  (0)

1652a0b8730e4cd4fec952262d1bed73

Artificial Intelligence: A New Hope to Stop Multi-Stage Spear-Phishing Attacks

November 07, 2017 Added by:Asaf Cidon

Artificial intelligence to stop spear phishing sounds futuristic and out of reach, but it’s in the market today and attainable for businesses of all sizes, because every business is a potential target.

Comments  (0)

50a3c69a961fe8acf7b68c430ab8c592

Convenience Comes at a Steep Price: Password Management Systems & SSO

July 12, 2017 Added by:Alexandre Cagnoni

Many consumers and businesses are flocking to the mirage of safety offered by password management firms, which are only as strong as their weakest link (often humans).

Comments  (0)

81150be5971b06d836999bd9f01812f2

Make Sure We're Using the Same Language

June 27, 2017 Added by:Jay Kelley

Punycode (a way to represent various non-ASCII characters) can be used for malicious purposes, as a Chinese researcher discovered earlier this year.

Comments  (0)

B2469d3b365f73d091fac06f227950e2

When Is Apple.com Not Apple.com? Faked Punycode Domains Running Rampant

May 01, 2017 Added by:Magni R. Sigurdsson

We have seen a significant uptick in phishing attacks using “Punycode” to exploit a basic vulnerability in web browsers.

Comments  (0)

D99975c323ad3ec7e199a4b5b1c374d7

Stop the Phishing Frenzy; Arm Against the Danger with Detection and Response

December 23, 2016 Added by:Gary Southwell

Phishing continues to pose serious risk for today’s businesses that face significant financial loss, exfiltration of data, compromised credentials, loss of productivity and damaged reputations.

Comments  (0)

370ef523fe9b1e0fd202d26a56e3584a

Holiday Shopping Security Tips for Consumers

December 02, 2016 Added by:Dan Ross

Cyber Monday kicked off a month of great deals for consumers and high profits for online retailers. Unfortunately, this time of the year also offers hackers different ways to launch cyber-attacks, steal information, and compromise devices.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Beyond Phishing: What You Need to Know About Whaling

June 13, 2016 Added by:Dan Lohrmann

Just when you thought you had seen it all regarding online phishing scams, along comes a new round of deceptive emails, phones calls, instant messages and even traditional printouts from your fax machine.

Comments  (0)

A2f01e8907594a5cc33b21086a702036

Baiting the Phishermen: When Companies Strike Back at Scammers (Do Not Try This at Home)

May 16, 2016 Added by:Steven Rogers

It is never too late to remind employees about phishing emails and where to route suspicious finds.

Comments  (0)

564d3c4d8288860c70049e09a49d1ae1

A Security Lesson from Down Under: Australia’s Banking App Malware Theft

April 20, 2016 Added by:Harvey Boulter

The technology exists for banks to provide spoof-proof communications internally and to their customers, to avoid attacks such as those against the Android apps of major Australian banks.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Protecting Yourself (and Your Organization) from Ransomware

April 04, 2016 Added by:Dan Lohrmann

While media attention has focused on global terrorist incidents and the presidential primaries, a growing number of business emergencies caused by ransomware are sweeping the world. The risk of this situation escalating into a significant public- or private-sector crisis is growing.

Comments  (0)

F08d1219500edcf01d8b56ee28634437

March Madness Security Threats Can Drive Any Organization Mad!

March 14, 2016 Added by:Mark Parker

Unfortunately, while the popularity of March Madness (the NCAA Basketball Tournament) has grown exponentially, nearly every facet of any employee’s involvement with the event could open up the employee, as well as the organization, to a number of cyber risks.

Comments  (0)

1fec6881fe864bc30369edb548ea22b1

Yes. The World Needs More Security Predictions

February 17, 2016 Added by:Dan Lohrmann

With the surging growth in cyberspace, new technologies, Wi-Fi, apps, robots, drones, terrorists with social media accounts, the Internet of Things (IoT) and nation-state hacking, online data security has become the Achilles’ heel of the Internet. A growing number of people want to know about new apps available for their smartphones and their data in the cloud – along with the upcoming securit...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »