“Cybercrime Uses Social Engineering Techniques to Steal Employee Credentials and Commit Payroll Diversion.”

When Does Effective Persuasion Become Manipulation? There’s a fine but clear line between ethical and unethical persuasion, says Joe Gray, a security consultant from the “Advanced Persistent Security” blog...

The speaker can overcome nerves with useful tips on public speaking

Public speaking and presenting at conferences can be daunting for the majority of people but by including some subtle tricks, the speaker can deliver a stronger message Even though the first...

[Heads-up] Two Interesting Things You Want To Know About Right Away

This is the very first time I am giving you...

Microsoft Office Macros Remain Top Choice for Malware Delivery

Microsoft Office documents containing malicious macros accounted for 45 percent of malware loaders in August 2018, according to a blog post by Cofense. These macros were used to deliver a...

DanaBot Banking Trojan Emerges Again With New Features

DanaBot Banking Trojan was discovered earlier this year by Proofpoint, targeting users in Australia through continuous malicious email campaigns, later it expands to Poland, Italy, Germany, Austria. It is a banking...

It Only Takes One Phish to Spoil Your IPO

The recent data breach of pre-IPO biotech firm Guardant Health shows how much impact a single successful phishing attack can have on an organization. Healthcare and biotech companies hold some pretty...

Looking at Cyber Attacks From the Inside Out, It’s All About Social Engineering

Frances Zelazny, Vice President of BioCatch, gave a recent Tech Republic interview to share some insight into how hackers can access your passwords. It's familiar but worth reviewing, since the...

ESET researchers uncover major banking fraud attempts

ESET researchers uncover major banking fraud attempts – Week in security with Tony Anscombe This week’s security news with ESET’s Global Security Evangelist & Industry Ambassador Tony Anscombe covers two new...

Newegg announces attackers compromised its online payments system

The skimmer, injected into the store’s payment page, harvested credit-card details from the store’s online customers for more than a month The major electronics and computer hardware retailer Newegg has announced...

The Need for Security Champions as Part of Your Security Culture

Security cultures don’t exist within organizations because IT wills them to. With the increase in attacks, organizations need internal advocates for the necessary shift in corporate culture to occur. Just about...

APLICATIONS

The missing link in Microsoft’s A.I. strategy

The future belongs to the tech company that best harnesses artificial intelligence. A.I. is vital to understanding what consumers want and thus better...

HOT NEWS