Phishing news, analysis, research, how-to, opinion, and video.

phishing attempt
cyber security lock secure security

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

The Web's 10 most dangerous neighborhoods

Ten top-level domains are to blame for at least 95 percent of the websites that pose a potential threat to visitors

ashley madison

Why corporate security pros should care about the Ashley Madison breach

Fallout from the Ashley Madison breach could lead to a wave of spear phishing

internet addiction

7 easy steps to Internet street smarts

The Internet is a lawless place rife with shady characters. Learn to avoid their sleazy ploys and get back home safe

Spam rate falls below 50 percent for first time in a decade

As the cost of entry into the spam business rises and the likelihood of a return falls, there's less of an incentive

middle manager

Phishers targeting middle management

Phishing scammers have busy middle managers in their crosshairs. Here’s how to avoid being a victim

phishing attempt

Email security and spear phishing secrets of an ex-hacker

Technology and user training together can help CISOs protect their data against the attacks demonstrated by Kevin Mitnick

email security

Macs in the office: Success breeds security FUD

By all means, secure your Macs -- but don't get taken for a ride when you do so

Phishing for passwords

After breaches, higher-ed schools adopt two-factor authentication

Boston University and University of Iowa tighten protection of user credentials with two-factor authentication

email security

6 best practices for email security

Here are some ways to tighten up your email policies and improve network security

URL-spoofing bug in Safari could enable phishing attacks

Researcher develops code that can trick Safari into showing a different URL in its address bar than the one currently loaded

careless workers security

Security best practices for users is your first line of defense

End-users are woefully unprepared to deal with phishing scams, social engineering schemes that are the cause of a lot of breaches

Premera, Anthem data breaches linked by similar hacking tactics

Security analysts last year saw a fake domain spoofing Premera's name

Google error leaks website owners' personal information

Privacy breach involves whois database that contains contact information for people who've bought domain names

Dangerous IE vulnerability opens door to powerful phishing attacks

The flaw can be used to steal authentication cookies and inject rogue code into websites

security phishing hook

Prevent phishing attacks with OpenDNS, 'Minority Report'-style

The use of big data analytics means potential threats can be blocked before your traditional malware defenses even know they exist

cyber security lock glow data

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

electronic mail wpt037

The beginning of the end of the private mail server

Thanks to overzealous filtering by mail relays, the small mail server is becoming an endangered species

Load More