Social engineering attacks can’t be stopped with technology alone; nor can they be stopped with training alone.
Browsing: Phishing
Key arguments for password alternatives relate to better security and convenience – passwords now occupy so many aspects of our lives.
The list of countries most frequently targeted by malicious emails has undergone some changes since the third quarter of last year.
By now, you are probably aware of the Heartbleed Bug. There are many people who have heard about it, but don’t understand what it is.
Despite the increased share of phishing attacks on online stores, the most frequently attacked category of organisation was still social networking sites
From all of the security controls an organization could deploy, which one do you feel adds the most actual value for day-to-day info security and why?
A few weeks ago, Comodo AV Labs discovered a new variant of the ZeuS Banking Trojan, officially named Trojware.Win32.Zbot.sig.
In this article I am referring to this as OSINT, and an established process of a Security Triage to discover what you don’t know
WhiteHat Security, the Web security company, today announced the latest edition of the WhiteHat Security Website Security Statistics Report
Banking Trojans, including the notorious Zbot, Carberp and SpyEye programs, accounted for two-thirds of financial malware