Mobile Phishing on the Rise

With users being three times more likely to click on a suspicious link on their mobile device, along with over half of mobile users tapping on a phishing URL, mobile...

[Scam Of The Week] Amazon Prime Day Is Only 4 days away

It's a prime opportunity for the bad guys to send a raft of phishing attacks. We do have a "Free Amazon Prime Account" template that we just modified to fit...

Malware research and police combine to put cybercriminals behind bars

Law enforcement and malware research join forces to take down cybercriminals The primary purpose of malware analysis is to determine how a given piece of malware works, extract IOCs (Indicators...

Just How Far Will Cybercriminals Go for a Scam? Apparently into Outer Space.

The Nigerian Prince scam was found taking a turn upwards to the stars, seeking your help to bring a poor lonely astronaut home.It seems the most well-known email scam around...

Facebook facing fine in UK over infamous data breach

Social media giant fined in the UK for failing to protect users’ personal information and for a lack of transparency Facebook is facing its first possible financial penalty for its...

[Live Webinar] Why You Should Be Using Deception: Decoys, Honeypots, and Red Herrings

Every company in the world should be utilizing some form of deception as part of their overall computer security defense. Decoys...

Ammyy Admin hit by malware again with World Cup used as camouflage

Website altered to serve a malware-tainted version of otherwise legitimate software with the global event in Russia acting as a smokescreen Users who downloaded the free remote administration tool Ammyy...

“Because that’s where the money is…”

Most readers will probably be familiar with the story of bank robber Willie Sutton who, after being nailed by the cops, was asked why he robbed the bank. His answer...

Polar Flow app exposes location of security personal around the globe

Reminiscent of the recent controversy surrounding the fitness-tracking app Strava, the tale involving Polar Flow shows how the sharing of seemingly innocuous – but potentially telltale – data can have...

July’s Simulated Phishing and Security Awareness Training Live Demo

Old-school Security Awareness Training doesn’t hack it anymore. More than ever, your users are the weak link in your network security.  Join us Wednesday, July 11 2018, at 2:00 p.m. (ET) for a 30-minute live product demonstration...

APLICATIONS

Hacking bitcoin and blockchain

It is hard to turn on the television or read a tech blog without getting inundated with stories about bitcoin or blockchain. The...

What is the cyber kill chain?

HOT NEWS