It’s become a fact of life that hackers might lock down your computer, blocking access to your most valuable data,…
Browsing: Deception
There are countless ways to carry out a cyber attack, but for the vast majority the key is deception –…
Palo Alto Networks’ Unit 42 announced that it had discovered that the cyber espionage group, known as Tick, had targeted a specific type…
Social engineering attacks are usually associated with deceptive phishing emails in which the victim is tempted to click on a…
BEC runs rampant as conventional email security fails to detect display name deception; Agari enhances its Enterprise Protect functionality to…
If you’re thinking of downloading a handy flashlight app for your phone, beware: Check Point researchers have detected a new…
The next 12 months will see major developments in the arms race between cyber attackers and security defenders as they…
Following on from the story of a US judge losing $1m in an email fraud scam, John Wilson, Field Chief…
Analysts Examine Industry Trends at Gartner Security & Risk Management Summit, 12-15 June 2017, National Harbor, MD NATIONAL HARBOR, MD…
Rapid7 Insight platform is the first cloud-based platform to combine vulnerability management, user behaviour analytics-powered SIEM, IT log analytics, and…