Last quarter brought with it a maddening number of political ads, shocking and divisive news stories on climate change and gun…
Tag: spear phishing
6 sure signs someone is phishing you—besides email
There are several common and, unfortunately, frequently successful avenues of attack that cybercriminals can use to part you from your personal…
The enemy is us: a look at insider threats
They can go undetected for years. They do their questionable deeds in the background. And, at times, one wonders if they’re…
New macro-less technique to distribute malware
One of the most common and effective infection vectors, especially for businesses, is the use of malicious Office documents. This year…
5 cybersecurity questions retailers must ask to protect their businesses
The Target breach in 2013 may not be the biggest retail breach in history, but for many retailers, it was their watershed…
Something’s phishy: How to detect phishing attempts
Dear you, It appears you need to update your information. Click here to tell us all your secrets. No really, it’s…
New targeted attack against Saudi Arabia Government
A new spear phishing campaign is targeting Saudi Arabia governmental organizations. The attack originates from a phishing email containing a Word document…
The growing threat from phishing
By Michael Osterman Some Background Phishing attempts are widely distributed messages, normally delivered through email, that are designed to gather sensitive information…
New York Times Hackers: ‘Gone Phishing’
If you’ve been reading the news lately, you’ve probably noticed the New York Times (NYT) website was defaced just two days…
Phishing 101: Part 2
“Over the years, phishing attacks have changed, as with most things, and have been segmented into different groups of variants.” –Me…