Quantcast
Channel: CIO.com - Phishing
Browsing all 37 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

IT and Employees See BYOD Security (Much) Differently

IT organizations continue to struggle with the details when it comes to enabling BYOD for applications beyond email, and a new study finds that while employees are eager to access corporate resources...

View Article



Image may be NSFW.
Clik here to view.

5 Ways to Stay Safe Online on Black Friday, Cyber Monday

Black Friday and Cyber Monday are two of the busiest online shopping days of the year, and a peak period for malware, phishing and spam. Here are five tips you can share with employees to help protect...

View Article

Image may be NSFW.
Clik here to view.

Online Security Basics for Small Business Websites

Everyone on the Web is a target for scams, malware, piracy and a host of other online security dangers. Small business owners are no exception. These tips will help you protect your website, your...

View Article

Image may be NSFW.
Clik here to view.

Top 12 IT Security Stories of 2012

The holidays are nearly here and 2012 is on the way out. It's time to reflect on some of the most popular security stories and tips of the year as we prepare for 2013.

View Article

Image may be NSFW.
Clik here to view.

Top 12 Security Slideshows of 2012

As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.

View Article


Image may be NSFW.
Clik here to view.

Malware Strikes With Valid Digital Certificate

We rely upon digital certificates and certificate authorities to validate that online entities are who they say they are, but security firm Malwarebytes recently found a banking Trojan with a valid,...

View Article

Image may be NSFW.
Clik here to view.

Google, Microsoft and Others Putting Kibosh on Phishing Emails

A year after Google, Microsoft and other email heavyweights launched the DMARC program to filter out spoofed email that attackers use for phishing, they say an estimated 60% of the world's email boxes...

View Article

Image may be NSFW.
Clik here to view.

How ADP and Facebook Battle Bad Email

Each day cyber-criminals around the world manage to unleash untold millions of spoofed e-mails that fake well-known brand names to try and fool victims that receive this fraudulent e-mail into opening...

View Article


Image may be NSFW.
Clik here to view.

How to Blunt Spear Phishing Attacks

According to Allen Paller, director of research at the SANS Institute, 95% of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email...

View Article


Image may be NSFW.
Clik here to view.

6 IT Security Innovations to Keep You Ahead of Attackers

Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will...

View Article

Image may be NSFW.
Clik here to view.

IRS Uncorks Dirty Dozen Tax Scams for 2013

The Internal Revenue Service today reminded taxpayers that there are plenty of scam artists and cybercriminals that want your money.

View Article

Image may be NSFW.
Clik here to view.

DHS Warns of Spear-Phishing Campaign Against Energy Companies

The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it.

View Article

Image may be NSFW.
Clik here to view.

Twitter Plans Two-Step Authentication to Prevent Hacks

Following Tuesday's hacking of the Associated Press' Twitter account, the microblogging site is reportedly working on a two-step authentication security solution to help prevent future hijackings.

View Article


Image may be NSFW.
Clik here to view.

Hackers Increasingly Target Shared Web Hosting Servers for Use in Mass...

Nearly half of phishing attacks seen during the second half of 2012 involved the use of hacked shared hosting servers, APWG report says.

View Article

Image may be NSFW.
Clik here to view.

FAQ: Phishing Tactics and How Attackers Get Away With it

Phishing attacks on enterprises can be calamitous in terms of compromised networks or damaged brand names, and the Anti-Phishing Working Group (APWG), which aggregates and analyzes phishing trends data...

View Article


Image may be NSFW.
Clik here to view.

Booming Mobile Industry Spawning Global Criminal Marketplace

In an alarming 'post-PC' era alert, working group says criminal infrastructure created much faster than it was for PC fraud.

View Article

Image may be NSFW.
Clik here to view.

Spear Phishing Paves Road for Advanced Persistent Threats

Specialized spam can be more than it seems -- it sets up a beachhead for malware mischief.

View Article


Image may be NSFW.
Clik here to view.

Phishers Try to Fry Apple Fanboyz After Dev Site Breach

Internet con artists quickly jumped on the news of a data breach at Apple's developer website to launch a phishing campaign aimed at relieving users of their online credentials.

View Article

Image may be NSFW.
Clik here to view.

Researchers Propose Security That Adapts to Combat Malware That Morphs

Attackers launch malware that automatically alters itself to avoid detection, and they constantly create new domains where their command-and-control servers can hide, but researchers have come up with...

View Article

Image may be NSFW.
Clik here to view.

Group Behind Attack on New York Times Linked to G20 Phishing Attack

Multiple groups are leveraging the upcoming G20 summit to launch Spear Phishing attacks, including the group responsible for attacking the New York Times.

View Article
Browsing all 37 articles
Browse latest View live




Latest Images