According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.
To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
Since January, cybercriminals have responded to browser security enhancements by increasing their use of HTTPS in phishing sites.
A single breach is all it takes to wreak havoc on a health care organization that relies solely on perimeter controls for critical data protection.
More than half of the world's cyberattacks now originate from EMEA countries, with the Netherlands being ground zero for 38 percent of phishing scams.
A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
Phishing attacks used to be the work of hobbyists, but now professional fraudsters are leveraging stolen credentials to compromise multiple accounts.
Marketers use email tracking pixels to evaluate their campaigns, but cybercriminals have repurposed the technology to conduct recon on potential victims.
Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.