Phishing Scammers are Planning Well into 2020
Cybercriminals are already looking to take advantage of the 2020 Tokyo Olympics. Are you thinking years out? The bad guys are.
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
Cybercriminals are already looking to take advantage of the 2020 Tokyo Olympics. Are you thinking years out? The bad guys are.
Students from Plattsburgh State and SUNY Adirondack were targeted by several types of scams over the summer, causing Plattsburgh State officials to send out warnings to the student body. ...
And just one mistake can compromise an entire organisation. Danny Palmer at ZDNet wrote: "One in every one hundred emails sent round the globe has malicious intent, likely to deliver ...
The Korea JoonGang Daily reported that despite warnings from financial authorities, an average of 116 people fall victim to what is called "voice phishing" scams every day in Korea.
The Necurs botnet – most notably responsible for distributing Locky – is now pushing weaponized internet or web query (.IQY) file to evade detection and download malware.
This latest statistic takes the spotlight off of antivirus as the protector, and puts the focus squarely in the hands of your users to stop attacks.
Kacy Zurkus at the InfoSec group had the scoop on a campaign recently reported by Farsight Security involving an internationalized domain name (IDN) "homograph-based" phishing website ...
The largest of organizations aren’t the only ones being hit with cyberattacks. Everyone from the SMB on up is at risk and is actively a target.
This latest heads-up around phishing-based warfare from a source as reputable as Google show the need to both be watchful for and responsive to phishing attacks.
The Turla threat group, certainly Russian-speaking and widely attributed to Russian intelligence services, is back with a new phishing technique. The threat actor is distributing emails ...
Even with authentication, identification, and validation frameworks and solutions in place, the number of potentially malicious emails remains staggering.
Secureworks® Counter Threat Unit™ (CTU) researchers reported that despite indictments in March 2018, the Iranian threat group is likely responsible for a large-scale campaign that ...
The FBI received a report from the US Democratic National Committee (DNC) that unknown actors sought access to a voter database through a phishing campaign.
The GRU, the Russian military intelligence spy agency which was responsible for the 2016 election cyber attacks, is at it again and are now targeting the U.S. Senate and conservative ...
Online, e-commerce and mobile fraud are on the rise, according to RSA, with 41% of successful attacks enabled by phishing scams.
The attack dubbed “PhishPoint” by Cloud Security vendor Avanan demonstrates the craftiness and extent cybercriminals will go to in order to harvest Office 365 credentials.
With so much else on their plate, are today’s IT organizations doing enough to protect the organization against social engineering and phishing attacks?
Trustwave shows how the latest advancements in technology could be used to aid cybercriminal activity.
Whether online-related or not, insurance is insurance. So, shouldn’t there be discounts for organizations who demonstrate cyber-responsibility?
This was sent to me by a friend that I know is legit. It's a fun read and has some good tips on how to stay safe using social media.