Scam Bucket: Ice Phishing
The most interesting scam we’ve found is brand new. It’s called “ice phishing” and it involves taking advantage of the disconnect between language and code.
Read more...The most interesting scam we’ve found is brand new. It’s called “ice phishing” and it involves taking advantage of the disconnect between language and code.
Read more...Everyone in cybersecurity and quite a few people beyond have probably heard about pentesting. But what is penetration testing really? This article has all the answers.
Read more...Compared to large organizations, smaller suppliers with fewer security-aware employees are more likely to unwittingly click on a malicious website. This could have repercussions across the supply chain, triggering ransomware attacks on larger organisations. As a result, phishing has become one of the biggest threats to cybersecurity this year.
Read more...Personal data isn’t just about your name, it’s also about your online habits. Collecting that data sometimes seems creepy, but it can protect you from fraud, too.
Read more...How will ransomware evolve further and what can organizations do to prevent or at the very least mitigate ransomware attacks? An event where Cyber Protection Magazine participated had some suggestions.
Read more...The human element remains the weakest link in cybersecurity. In our latest guest post, Oliver Noble lays out how security-oriented work culture is put into practice.
Read more...With more people working from home, protecting their digital identity is crucial.
We interview Mike Kiser, Senior Identity Strategist at SailPoint, about the ongoing attacks and what companies and individuals can do to protect their digital identities.
Not very surprisingly, a recent report shows that cyber attacks not only increased in numbers in 2020, they were also, generally speaking, more successful. Read how criminals ensured success in our latest article.
Read more...Increasing security awareness plays an important role in securing businesses. A new report now shows that while progress is being made, security awareness programs are far away from being effective.
Read more...Are you able to identify a good phishing mail? Take a look at the anatomy of a phishing e-mail in our infographic!
Read more...