Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.
Google just pushed its email encryption project, E2EMail, to open source. What does this mean for the development of corporate email security?
A new phishing report from Google Research makes it clear: Corporate inboxes lure the largest number of phishing and malware attacks.
It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.
The Indian government implemented new policies and guidance in response to several high-profile attacks against the Indian banking sector in the past year.
The phishing attack is still fraudsters' favorite trick. Researchers recently observed new phishing campaigns aimed at cloud storage services.
Researchers detected a wave of phishing attacks in the U.K. delivering malware that shares code with the infamous Dridex banking Trojan.
A security researcher disclosed a new phishing scam that prompts users to click a malicious link and enter login information to unlock a fraudulent PDF.