Phishing news, analysis, research, how-to, opinion, and video.

click fraud currency banking
breach title

Data analytics, big data, business, chart, laptop

Business email scams steal $2.3 billion via rogue wire transfers

The number of companies that wired money as a result of email scams has grown 270 percent since January 2015

Windows PowerShell logo

New ransomware abuses Windows PowerShell, Word document macros

The PowerWare ransomware is written completely in the Windows PowerShell scripting language

verizon sign

Verizon releases first-ever data breach digest with security case studies

Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study

security hacker privacy

What happens when Google Doc credentials are leaked on the Dark Web

A security company recently laid tempting bait online in order to see how hackers would react. Guess what? People start looking at your documents

gmail icon

Google adds warning to unencrypted emails

Users will also be told when they may be conversing with someone who is not a real person

Cyber criminals cash out using PowerShell, other legitimate tools

Kaspersky Lab found three cyber crime gangs using customized malware and APT-style reconnaissance to get the stolen money into their pockets

social engineering

7 signs your network is being hacked

Comprehensive awareness training for your company’s employees should prevent these scenarios from taking down your network

holiday ecommerce

4 do's and don'ts for safer holiday computing

It's the season for scams, hacks, and malware attacks. But contrary to what you've heard, you can avoid being a victim pretty easily

xmas malware

'Tis the season ... of malware

Every year cyber criminals find the time to give out holiday malware, so look out for these pieces of malware coal

10 reasons why phishing attacks are nastier than ever

10 reasons why phishing attacks are nastier than ever

Forget Nigerian princes -- today’s spearphishing is sophisticated business, fooling even the most seasoned security pros

Phishing key

Phishing sites exploit trust in valid SSL certificates

Cyber criminals are taking advantage of cheap, low-cost options to grab valid SSL certificates for phishing sites

phishing attempt

Teach your execs well: Stop phishing in the C-suite

To keep company information and systems safe, IT needs to blend user training with technology defenses

cyber security lock secure security

When is a flaw not a flaw? The WinRAR question

A researcher found remote code execution flaw in WinRAR, but the real question is why are you opening unknown RAR files

malware threat hack hacked bug cyberthreat

8 ways to fend off spyware, malware, and ransomware

Here are some painless precautions you can follow that might help keep you step ahead of cyber attacks

The Web's 10 most dangerous neighborhoods

Ten top-level domains are to blame for at least 95 percent of the websites that pose a potential threat to visitors

ashley madison

Why corporate security pros should care about the Ashley Madison breach

Fallout from the Ashley Madison breach could lead to a wave of spear phishing

internet addiction

7 easy steps to Internet street smarts

The Internet is a lawless place rife with shady characters. Learn to avoid their sleazy ploys and get back home safe

Spam rate falls below 50 percent for first time in a decade

As the cost of entry into the spam business rises and the likelihood of a return falls, there's less of an incentive

Load More