Social Media Facial Recognition Could Make the Bad Guys Worse
Trustwave shows how the latest advancements in technology could be used to aid cybercriminal activity.
Learn about current phishing techniques, notable campaigns and attacks, what to watch out for 'in the wild', and more.
Trustwave shows how the latest advancements in technology could be used to aid cybercriminal activity.
Whether online-related or not, insurance is insurance. So, shouldn’t there be discounts for organizations who demonstrate cyber-responsibility?
This was sent to me by a friend that I know is legit. It's a fun read and has some good tips on how to stay safe using social media.
It should come as no surprise that the most successful attack tactic is being used more in 2018. APWG’s latest report shows us the trends and what to expect for the remainder of 2018.
A new batch of U.K. phishing campaigns is using compromised email contacts to lure targets from the engineering, transport and defense sectors.
Spam is forty years old, and it's still the enduring favorite of cyber criminals. What's reckoned to have been the first spam was distributed in 1978 over ARPANET. ARPANET would evolve ...
Attacks that target business email accounts continued to increase in the second quarter of 2018, accounting for 23% of incidents reported to Beazley P.L.C. clients, the insurer said ...
Several state government offices in the US have received CDs by mail, infected with malware. It's a clumsy attempt, according to an alert the Multi-State Information Sharing and Analysis ...
It's clear to everyone that company's brand is a valuable property. Often hundreds of millions of dollars were used to create the brand over decades. It creates instant recognition and ...
US-CERT alert sounds the alarm on Emotet, one of the most costly and destructive malware strains currently active.
People can’t resist the lure of free stuff. Cyber criminals know this and are always looking for ways to make a quick effortless buck. Put these two together and you have the perfect ...
Curiosity for one of the most aggressive and dangerous beasts in the ocean has us dedicating a week to learning about it. Should cyberattacks that put your organization at risk get equal ...
We've been reporting on the top-clicked phishing email subjects every quarter for a while now across three different categories: general emails, those related to social media, and 'in the ...
So, here's a new CEO Fraud phish: see these fresh screen shots from emails reported to us through the free KnowBe4 Phish Alert Button. Bad guys spoof the managing partner and CPA and an ...
The recent indictment by special counsel Robert Mueller of 12 Russian military officials for the hacking of Democratic servers and emails in 2016 is a powerful reminder – phishing works.
With users being three times more likely to click on a suspicious link on their mobile device, along with over half of mobile users tapping on a phishing URL, mobile phishing is a bigger ...
The Nigerian Prince scam was found taking a turn upwards to the stars, seeking your help to bring a poor lonely astronaut home.
Krebs on Security has posted a new item: "Here's a clever new twist on an old email scam that could serve to make the con far more believable. The message purports to have been sent from ...
Most readers will probably be familiar with the story of bank robber Willie Sutton who, after being nailed by the cops, was asked why he robbed the bank. His answer (undoubtedly delivered ...
Very interesting article in the Insurance Journal. In a closely-watched case on insurance coverage in an age of expanding cyber risk, a federal appeals court in New York has upheld a ...