Phishing

Phishing | News, how-tos, features, reviews, and videos

Failure frustration anger user man worker
Cybersecurity  >  Email security threats, such as phishing

An unknown number calls a mobile phone amid pixelated data.

Vishing explained: How voice phishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

COVID-19 coronavirus scam alert

8 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

Smishing  >  A woman looks at her mobile phone in horror when receiving a malicious SMS text message

What is smishing? How phishing via text message works

Don't let the cute name fool you, smishing is a cyberattack that uses misleading text messages to trick victims into sharing valuable information, installing malware, or giving away money.

pharming  >  faudulent website redirect

Pharming explained: How attackers use fake websites to steal data

A pharming attack aims to redirect victims’ web traffic away from their intended destination to a website controlled by threat actors to harvest information and spread malware.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

phishing hack scam malware binary code

14 real-world phishing examples — and how to recognize them

How well do you know these crafty cons?

A white speech bubble with an email icon indicating a new unread message against a viral background.

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Many of the emails take advantage of an unpatched, decades-old Microsoft Office vulnerability to deliver malware. Advice: Patch now.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.

security threats and vulnerabilities

How to protect remote workers from the coronavirus crime wave

As predicted, the coronavirus crisis is bringing out the worst in cybercriminals. But the attacks are really just old exploits modified to exploit the new coronavirus context. Here’s how to beat them.

network security concept

COVID-19 and tech: New collaboration tools mean new security risks

As the coronavirus forces companies to move their communication and file sharing onto collaboration platforms, be prepared for unintended consequences: New security threats will surface, requiring new methods of securing your...

coronavirus closed for business surgical mask bby tim mossholder via unsplash .artistgndphotographe

What your business can do about the coronavirus ... right now

The Covid-19 crisis is the Black Swan event of our lifetime. Here's how to hold it all together (while keeping employees apart).

Abstract trend lines graphing change and transformation.

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

Cybersecurity  >  Attack warning / danger / security threat

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

Scripting code displays on a laptop in a dark room.

How to prevent scripting attacks in Microsoft Office

The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script.

mobile phone messaging email network collaboration tools

With email security, some things can't be outsourced

You can outsource your email, but a good chunk of securing that email remains in-house. Here's what you need to know.

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.

incoming emails / DNS security / locked server / parked domain

How to stop email spoofing of parked domains

Publishing a DMARC record for unused domains is a good idea. Here's how.

Load More
You Might Also Like