June 29, 2017 Change of Style in Phishing Attacks Creates Fresh Concerns for Big-Name Brands 2 min read - Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.
Identity & Access June 22, 2017 The Enemy Within: Identifying Insider Threats in Your Organization 2 min read - According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
Risk Management June 7, 2017 Five Tips to Stay Safe on Social Media While Traveling 3 min read - Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.
Software Vulnerabilities May 30, 2017 Relying on Data to Mitigate the Risk of WordPress Website Hijacking 9 min read - To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
May 22, 2017 Fraudsters Increase Use of HTTPS in Phishing Sites to Keep Pace With Browser Security Enhancements 2 min read - Since January, cybercriminals have responded to browser security enhancements by increasing their use of HTTPS in phishing sites.
Healthcare May 12, 2017 The Doctor Is In: Building a Security Immune System for Health Care 2 min read - A single breach is all it takes to wreak havoc on a health care organization that relies solely on perimeter controls for critical data protection.
May 11, 2017 UK, Netherlands Emerge as Growing Hotspots for Originating Cyberattacks 2 min read - More than half of the world's cyberattacks now originate from EMEA countries, with the Netherlands being ground zero for 38 percent of phishing scams.
May 2, 2017 New Mac Malware Targets User Communications 2 min read - A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
Fraud Protection May 2, 2017 Gone Phishing: Don’t Fall for the Bait 3 min read - Phishing attacks used to be the work of hobbyists, but now professional fraudsters are leveraging stolen credentials to compromise multiple accounts.
April 20, 2017 Email Tracking Is More Than a Marketing Tool 2 min read - Marketers use email tracking pixels to evaluate their campaigns, but cybercriminals have repurposed the technology to conduct recon on potential victims.