A recent Gmail phishing scam took the world by storm and compromised several Google accounts.
5 myths about phishing attacks you shouldn’t believe
There’s a lot of information out there about phishing attacks – and plenty of misinformation, too. Believing the wrong thing about these attacks could end up costing you big time. Here are 5 myths that should be dispelled right away.
Phishing attack goes after Gmail users: What you need to know
Most phishing attacks are fairly simple. They often send an attachment or malicious link and try to get users to give up sensitive information. But this one works a bit differently.
The phishing attack your users will fall for next
Phishers are smart. They know what attacks work, and how to press the right buttons that get users to open their messages.
Phishers now use Twitter to craft clickbait attacks
If you’re active on Twitter (and even if you aren’t), phishers may have your number.
Phishing hazards go well beyond users alone
Most of the advice surrounding phishing prevention is warning users of the dangers and encouraging them to use caution when browsing or opening emails. But one of the biggest risks for a phishing attack won’t be fixed by these commonsense approaches.
What goes into a successful phishing attack? Study has the answers
Phishing is the primary choice for hackers looking to steal sensitive information or infect users systems’ with malware. But how is it that they’re so good at these attacks?
Think email threats are a thing of the past? Think again
With advanced zero-day attacks and exploit kits grabbing headlines, you might think that spam and other email threats were falling out of favor with hackers. But these attacks are still popular, partly because they’re such effective and cheap ways to get valuable data.
Warning: Customer service pros need more social engineering training
Amazon is being called out by one customer for having his personal information revealed to hackers by customer service pros … three separate times.
Study reveals top security trends of 2015
So far, 2015 has seen its fair share of security news, good and bad (although with security news, the bad often far outweighs the good). And with the benefit of hindsight, we can now take some time to look back on these developments to find top trends so far this year – and what should be […]