The phishing attack your users will fall for next

Phishers are smart. They know what attacks work, and how to press the right buttons that get users to open their messages. 

Phishers now use Twitter to craft clickbait attacks

If you’re active on Twitter (and even if you aren’t), phishers may have your number.

Clinton hack went deeper than first reported

The Democratic National Committee (DNC) has already acknowledged it was hit by cyberespionage earlier this year. Now comes reports that other groups with close ties were hit by the same attack – and the way it was carried out could have wide-reaching effects. 

Think email threats are a thing of the past? Think again

With advanced zero-day attacks and exploit kits grabbing headlines, you might think that spam and other email threats were falling out of favor with hackers. But these attacks are still popular, partly because they’re such effective and cheap ways to get valuable data. 

3 phishing attacks sneaking by IT’s defenses

IT pros know that phishing attacks are rampant. Most will train users to recognize the warning signs. But some recent attacks show that hackers are smart enough to try to stay one step ahead – and have devised attacks that can be successful even when users’ guards are up.

Phisher went after nuclear secrets from within

Two hot topics in security came to a head recently with an indictment of a former U.S. Department of Energy employee who was spearphishing dozens of his co-workers and bosses. 

The anatomy of a spearphishing campaign: 3 keys to stopping one

TrendMicro has discovered and reported on a spearphishing campaign that went after some very high-value targets. What it found could have lessons you can use for protecting your own users. 

3 security trends that should be on your radar

There’s no shortage of cyber threats out there today − and no shortage of areas IT needs shore up its defenses. But a recent report highlights the three biggest threats to your systems in 2014 and beyond. 

Latest spearphishing campaign goes hard against social media

If hackers just want any old data they can get their hands on, they’ll rely on brute-force attacks. But if they really want your company or customer info, they’re willing to work a little harder – and smarter – to get it, as evidenced by a recent spearphishing campaign. 

5 ways to protect users from phishing attacks

Target’s recent data breach was a security nightmare. But for some hackers, it was the perfect opening to something even more devious: phishing attacks.