Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack.
Security startup Cymmetria has put together a tool and a framework to help security defenders hack back legally as part of incident response activities.
Yes, password length and complexity matter, but only if you apply those qualities to the proper security context.
ICANN has postponed the deadline for updating name servers with the new root zone key signing key to early 2018 because too many ISPs and network operators are not ready, and that would cause DNSSEC validations to fail.
The scariest thing about BlueBorne, the attack vector that uses Bluetooth to spread across devices, isn't what it can do, but rather just how many similar vulnerabilities may be lurking that we don't yet know about.
Cyber criminals have the most to gain by taking ownership of bank, brokerage and retirement accounts using people’s PII. Are traditional authentication systems obsolete?
You can reduce potential damage by paying attention to when attackers are most likely to strike.
The United States intelligence agencies have Kaspersky Lab in their crosshairs, but this is a case of smoke, but no fire.