A new batch of industry-specific phishing campaigns is leveraging compromised email contacts to steal login information associated with employees of engineering, transport and defense organizations.
New data reveals that security professionals are increasingly concerned about employee negligence because it forces them to respond to preventable data breaches.
In June's security news, IT experts and educators around the world worked to create a new cybersecurity career pathway through initiatives designed to alleviate the industrywide skills shortage.
IBM X-Force researchers observed several ongoing spam campaigns tied to the World Cup — many of which used the official branding of tournament sponsors to lure victims.
Cybercriminals launched various phishing scams targeting World Cup fans leading up to and during the first week of the monthlong international soccer tournament.
The key to improving identity theft awareness is to understand the risks, which include phishing attacks, digital trust abuse, poor password management, BYOD policies and more.
Explore some of the most common social engineering tricks used to fool employees into handing over access to sensitive data. These include phishing, tailgating and social media pretexting.
According to a new report, cybercriminals now prefer to leverage human-centered vulnerabilities rather than launching automated attacks.
Twenty-Seven Percent of Employees Fail Social Engineering Test, Suggesting Need for Better Cybersecurity Training
According to a recent study, 27 percent of employees failed to respond appropriately to a simulated phishing exercise, underscoring the need for better cybersecurity training.
Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.