Phishing

Phishing news, analysis, research, how-to, opinion, and video.

ashley madison thumb800
internet addiction

Spam rate falls below 50 percent for first time in a decade

As the cost of entry into the spam business rises and the likelihood of a return falls, there's less of an incentive

middle manager

Phishers targeting middle management

Phishing scammers have busy middle managers in their crosshairs. Here’s how to avoid being a victim

phishing attempt

Email security and spear phishing secrets of an ex-hacker

Technology and user training together can help CISOs protect their data against the attacks demonstrated by Kevin Mitnick

email security

Macs in the office: Success breeds security FUD

By all means, secure your Macs -- but don't get taken for a ride when you do so

Phishing for passwords

After breaches, higher-ed schools adopt two-factor authentication

Boston University and University of Iowa tighten protection of user credentials with two-factor authentication

email security

6 best practices for email security

Here are some ways to tighten up your email policies and improve network security

URL-spoofing bug in Safari could enable phishing attacks

Researcher develops code that can trick Safari into showing a different URL in its address bar than the one currently loaded

careless workers security

Security best practices for users is your first line of defense

End-users are woefully unprepared to deal with phishing scams, social engineering schemes that are the cause of a lot of breaches

Premera, Anthem data breaches linked by similar hacking tactics

Security analysts last year saw a fake domain spoofing Premera's name

Google error leaks website owners' personal information

Privacy breach involves whois database that contains contact information for people who've bought domain names

Dangerous IE vulnerability opens door to powerful phishing attacks

The flaw can be used to steal authentication cookies and inject rogue code into websites

security phishing hook

Prevent phishing attacks with OpenDNS, 'Minority Report'-style

The use of big data analytics means potential threats can be blocked before your traditional malware defenses even know they exist

cyber security lock glow data

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

electronic mail wpt037

The beginning of the end of the private mail server

Thanks to overzealous filtering by mail relays, the small mail server is becoming an endangered species

Cyber espionage group launches sophisticated phishing attacks against Outlook Web App users

Pawn Storm attacks target military agencies, embassies, defense contractors, and media organizations, Trend Micro says

phishing

The human OS: Overdue for a social engineering patch

There is no way to plant a chip in employees to make them invulnerable to social engineering attacks, but training can make them much more difficult to 'hack'

Celebrities get phished, but the cloud gets blamed

No system is perfectly secure, but the fact is the cloud is more secure than on-premises systems

State-of-the-art spear phishing and defenses

Likelihood and severity of phishing attacks support paying upfront for that ounce of prevention

Load More