Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.
A new ransomware study found that splash screens are being used to manipulate users through social engineering and scare tactics.
A new report detailed how Adwind, a remote access tool, is surging in popularity and putting countless users at risk for cyberattack.
Cybercriminals recently breached two popular cryptocurrency platforms to steal personal information and digital funds to the tune of $300,000.
According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.
These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.
Posting vacation pictures or specific travel information online can expose social media users to identity theft, social engineering schemes and more.
An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.
Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.
A malicious Google Chrome extension is making the rounds to deliver malvertising. Here's how it works and how to avoid getting scammed.