Italian Researcher Michele Spagnuolo recently revealed a serious vulnerability in the popular Mailbox iPhone app.
Browsing: Phishing
The dangers of phishing and social-engineering attacks are well known and understood by businesses, NGOs and public bodies, so why are they still effective?
While the energy industry may fear the appearance of another Stuxnet on the systems they use to keep oil and gas flowing and the electric grid powered, an equally devastating attack could come from a much more mundane source: phishing.
Kaspersky Lab has uncovered a new APT campaign aimed at pilfering secrets from governments and supply chain industrial, military, media and technology companies in Japan and South Korea.
Easy Solutions, the Total Fraud Protection® company, today released an update to its DetectTA® fraud prevention solution
Think back to all of the corporate training you’ve sat through during your career. Chances are (especially if you’ve worked at a large enterprise), that some of that training had little relevance to your job duties.
One of the interesting aspects of security awareness training is the intersection of information security with human resources.
Coders like to tell a joke. There are two types of people, it goes: those who have been hacked, and those who are about to be hacked.
While phishing, reconnaissance scans, social engineering, and other opportunistic attacks still comprise the lion’s share of malicious activity seen by most companies, a growing proportion of attacks are able to evade signature-based defenses.
A new study on user risk shows that employers are willingly conducting user awareness training, but only half of them follow-up with additional tests to gauge such training’s effectiveness.