July 31, 2017 How to Shake the Hook After a Phishing Attack 2 min read - Is a phishing attack really so advanced? New research suggested that threat actors are lazy and reckless, giving users a chance to shake the hook.
July 25, 2017 Bugging Out: Fruitfly Malware Swarms MacOS Users 3 min read - A new strain of FruitFly malware has infected hundreds of users, possibly over the last 10 years. The malware is insidious, spying on MacOS users.
July 25, 2017 New Emotet Trojan Feature Spreads Malware on Internal Networks 2 min read - Researchers discovered a new variant of the Emotet Trojan that spreads across internal networks and serves as a downloader for other banking Trojans.
July 20, 2017 Google Adds Verification Screens for Plugins Following Phishing Attacks 2 min read - Google is rolling out a number of protections to combat phishing attacks through plug-ins. These verification steps will help users practice due diligence.
Identity & Access July 12, 2017 Outsider or Insider: Who Will Cause Today’s Data Breach? 2 min read - Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
June 29, 2017 Change of Style in Phishing Attacks Creates Fresh Concerns for Big-Name Brands 2 min read - Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.
Identity & Access June 22, 2017 The Enemy Within: Identifying Insider Threats in Your Organization 2 min read - According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
Risk Management June 7, 2017 Five Tips to Stay Safe on Social Media While Traveling 3 min read - Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.
Software Vulnerabilities May 30, 2017 Relying on Data to Mitigate the Risk of WordPress Website Hijacking 9 min read - To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
May 22, 2017 Fraudsters Increase Use of HTTPS in Phishing Sites to Keep Pace With Browser Security Enhancements 2 min read - Since January, cybercriminals have responded to browser security enhancements by increasing their use of HTTPS in phishing sites.