ESET Ireland warns of an authentic looking phishing scam email, pretending to come from Vodafone. The cybercriminals are up to…
Browsing: Phishing
Newly-discovered Trojan uses unsuspecting Android device users as tools to redirect traffic from WiFi-connected devices to websites controlled by the…
New research highlights opportunity for hackers to exploit employee trust Office workers are putting organisations at risk by being overly…
In a new blog post researchers from Proofpoint have tracked a phishing campaign leveraging the concept of “Twitter Brand Verification”. Because…
Insider threats and the danger they pose are both extremely publicized and well covered topics. Apart from the famous NSA…
Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from…
Kaspersky Lab experts have discovered a modification of the mobile banking Trojan, Faketoken, which can encrypt user data. Disguised as various programs and games, including Adobe Flash…
Following the news that PayAsUGym, a fitness website, has confirmed that 300,000 email addresses and passwords were accessed on Thursday last…
An Open Letter to President-Elect Trump from the Internet Security Community. Dear President-Elect Trump, You’ve campaigned to “Make America Great…
What is a faketivist? Faketivist /fāktəvəst/ Noun A fictitious persona created to emulate a hacktivist and act as a public-facing…