Phishing news, analysis, research, how-to, opinion, and video.

xmas malware
10 reasons why phishing attacks are nastier than ever

Phishing key

Phishing sites exploit trust in valid SSL certificates

Cyber criminals are taking advantage of cheap, low-cost options to grab valid SSL certificates for phishing sites

phishing attempt

Teach your execs well: Stop phishing in the C-suite

To keep company information and systems safe, IT needs to blend user training with technology defenses

cyber security lock secure security

When is a flaw not a flaw? The WinRAR question

A researcher found remote code execution flaw in WinRAR, but the real question is why are you opening unknown RAR files

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

The Web's 10 most dangerous neighborhoods

Ten top-level domains are to blame for at least 95 percent of the websites that pose a potential threat to visitors

ashley madison

Why corporate security pros should care about the Ashley Madison breach

Fallout from the Ashley Madison breach could lead to a wave of spear phishing

internet addiction

7 easy steps to Internet street smarts

The Internet is a lawless place rife with shady characters. Learn to avoid their sleazy ploys and get back home safe

Spam rate falls below 50 percent for first time in a decade

As the cost of entry into the spam business rises and the likelihood of a return falls, there's less of an incentive

middle manager

Phishers targeting middle management

Phishing scammers have busy middle managers in their crosshairs. Here’s how to avoid being a victim

phishing attempt

Email security and spear phishing secrets of an ex-hacker

Technology and user training together can help CISOs protect their data against the attacks demonstrated by Kevin Mitnick

email security

Macs in the office: Success breeds security FUD

By all means, secure your Macs -- but don't get taken for a ride when you do so

Phishing for passwords

After breaches, higher-ed schools adopt two-factor authentication

Boston University and University of Iowa tighten protection of user credentials with two-factor authentication

email security

6 best practices for email security

Here are some ways to tighten up your email policies and improve network security

URL-spoofing bug in Safari could enable phishing attacks

Researcher develops code that can trick Safari into showing a different URL in its address bar than the one currently loaded

careless workers security

Security best practices for users is your first line of defense

End-users are woefully unprepared to deal with phishing scams, social engineering schemes that are the cause of a lot of breaches

Premera, Anthem data breaches linked by similar hacking tactics

Security analysts last year saw a fake domain spoofing Premera's name

Google error leaks website owners' personal information

Privacy breach involves whois database that contains contact information for people who've bought domain names

Dangerous IE vulnerability opens door to powerful phishing attacks

The flaw can be used to steal authentication cookies and inject rogue code into websites

Load More