Second annual Human Factor Report details cybercriminals’ shifting social engineering tactics to focus on corporate targets Proofpoint, Inc., (NASDAQ: PFPT),…
Browsing: Phishing
Márton Illé, security evangelist for BalaBit IT Security, reviewed the new 2015 Verizon Data Breach Investigations Report and made the following…
Kaspersky Lab security researchers have discovered a vulnerability in the kernel of Darwin – an open-source component of both the…
With the digital age came a host of opportunities for businesses to expand and flourish. But it also gave rise…
In order to develop a rational approach to nation-state hacking, it’s important to understand the background and change the way…
Survey of 10 to 18-year-old students shows cyberbullying is significantly more likely to originate from a friend than a stranger
CNN reported that Russia was behind last year’s State Department and White House hacks.
How does group policy work? Group policy is Microsoft’s core infrastructure for managing the configuration of both users and computers…
The Trojan Dyre (also known as Dyreza) has been around for quite awhile now, terrorizing the banking industry, stealing passwords…
TK Keanini, CTO of Lancope, had the following reaction to the new CompTIA security readiness study.