Phishing

Phishing | News, how-tos, features, reviews, and videos


template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Conversation hijacking attacks | Salted Hash Ep 38

Troy Gill, manager of security research at AppRiver, explains conversation hijacking attacks, or CHAs, with host Steve Ragan, including who is typically targeted and how to prevent them.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

Salted Hash Ep 10 Steve Ragan
video

Office 365 phishing examples | Salted Hash Ep 10

Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

Gmail Google Mail

Sneaky Gmail phishing attack fools with fake Google Docs app

Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts

hacker hack attacke cyber malware keyboard

McAfee: Wave of Shamoon cyberattacks coordinated by a single group

The campaigns are bigger and more sophisticated, and they're causing far more damage as the attackers learn new techniques and collaborate with other groups

phishing threat

Phishing scammers exploit Wix web hosting

Criminals flock to free web services to establish their attack infrastructure. The latest example: A group using free website host Wix for its phishing pages

bitcoins

Bitcoin rise fuels social media scams

The price of a single bitcoin passed that of an ounce of gold for the first time this month

IRS

IRS makes tax refund scams harder but W-2 phishing attacks continue unabated

Organizations continue to get pounded even as attacks targeting individual taxpayers appear to have slowed

marionette social engineering

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering

cleaning sponges detergent wash rinse chores

How to scrub your private data from 'people finder' sites

The internet has your number—among many other deets. Prevent identity theft and doxxing by erasing yourself from aggregator sites like Spokeo and PeekYou

ceo email scam spoof

Security researchers trick 'CEO' email scammer into giving up identity

Dell SecureWorks is encouraging businesses to use these tips to fight back against phishing schemes

irs chart phishlabs

IRS-related phishing scams seen running rampant

Also, Google, Dropbox, Adobe and DocuSign are being targeted by phishers, PhishLabs report says

donald trump

What 2017 has in store for cybersecurity

Donald Trump's administration seems to be the biggest concern

Network servers datacenter

Nearly half of all websites pose security risks

According to a new study of the top one million domains, 46 percent have security problems

hacker hacked unsecure theft passwords

17 essential tools to protect your online identity, privacy

From secure chips to anonymity services, here’s how to stay safe and private on the web

Load More