Phishing attacks arguably are the most persistent-and pernicious-cyberattacks that organizations face. They have grown to be more targeted and dangerous, as the variety of attack methods continue to evolve and the number of threat actors proliferate.
Styles of phishing continue to metamorphose from scattershot...
A group that hacked the Democratic National Committee - believed to be operating from Russia - has resumed its spear-phishing attacks, including fake emails bearing the names of Harvard University and the Clinton Foundation.
Consumer-serving industries are under continual attack, as cybercriminals find that the interface between the customer and the retail outlet is where the money is. The assault is occurring on all fronts, be it through the physical point-of-sale or ecommerce gateway, the enterprise and its supply chain, or the customer...
How Prepared is Your Enterprise to Defend Against Targeted Socially-Engineered Attacks?
Forty-six percent of surveyed security leaders say their organizations have been victimized by at least one socially-engineered attack in the past year. And 52 percent rate their organizations' defenses against such attacks at...
Microsoft says a zero-day flaw in Windows that was publicly revealed by Google - before a patch was ready - was being exploited by the Russian hacking group known as ATP28 and "Fancy Bear" via spear-phishing attacks.
When it comes to describing the top fraud threats to UK financial institutions, it's all about compromised identities and credentials, says John Marsden of Equifax. How can organisations prove their customers are who they say they are?
A new kind of malware for Mac OS X has been linked to Fancy Bear, the Russian group suspected of hacking the DNC and the World Anti-Doping Agency. But the malware only poses a low risk to users, experts say.
Social engineering is the lever that fraudsters are using to penetrate organizations and commit big-dollar crimes - and no amount of anti-virus protection is going to defend against these sophisticated targeted attacks. How prepared are you to defend against social engineering attacks such as spear phishing, business...
A new cyberattack trend report from Europol notes that while online criminals continue to refine their capabilities, old and unsophisticated attacks too often still succeed, thanks to poor digital hygiene and a lack of security by design and user awareness.
Agari's John Wilson doesn't just fight email fraud schemes - he also is the occasional target. What have the fraudsters inadvertently taught him about their latest tactics? And how can these lessons help organizations to improve their defenses? Find out in this video interview.
Cybercriminals wielding Locky crypto-locking ransomware are ramping up their assaults, especially in the healthcare sector, according to FireEye. Attackers are distributing less banking malware and more ransomware, researchers say.
The Global Cyber Alliance is taking on small projects to come up with solutions to big cyber risk problems. "It's essentially using a startup approach to a much bigger problem," CEO Phil Reitinger, who will keynote the upcoming ISMG New York Fraud and Breach Summit, says in this interview.
The FBI is warning U.S. businesses to beware of business email compromise scams focused not just on creating fraudulent wire transfers, but also stealing personally identifiable information. Experts, however, are criticizing the FBI's alert as being too little, too late.
Cybercrime alert: In March, 93 percent of all phishing emails studied contained ransomware designed to forcibly encrypt PCs, says PhishMe chief operating officer Jim Hansen. In an interview, he offers insights on how to respond.
To paraphrase an old saying, a wall is only as
strong as its weakest point. When it comes
to system and data security, people are
often that point.
People are the last line of defense to prevent
unblocked attacks from clearing a path to
your systems and data. To serve that role
effectively, employees must be...