Because most malware is spread via phishing, experts at Webroot are focusing their attention on stopping phishing attacks before they have a chance to infect a system with malicious code, says David Dufour, the company's senior director of engineering and cybersecurity.
In 2016, cyberattacks and cybersecurity (or a lack thereof) grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in...
We know why phishing works; we know how it works. And yet the schemes still work, and they're only getting more effective. How can we stop phishing? Jim Hansen of PhishMe has some ideas, and they just might surprise you.
Hansen, COO of anti-phishing vendor PhishMe, says it isn't about throwing more technology at...
Exploit kits are out and phishing emails are in for attackers who are attempting to infect victims with ransomware, according to new research. Unfortunately, the volume of phishing - and thus ransomware - attacks continues to grow.
We know why phishing works; we know how it works. And yet the schemes still succeed, and they're only getting more effective. How can we stop phishing? Jim Hansen of PhishMe has some ideas, and they just might surprise you.
In this edition of the ISMG Security Report: an analysis of a major fine against a Texas hospital and its implications for how the Trump administration might enforce HIPAA rules. Also, an IRS-related phishing scheme targets businesses.
Companies have lost thousands of dollars in email compromise attacks that first steal W-2s and then attempt wire transfer frauds, the IRS warns, labeling these attacks as among the "most dangerous" phishing scams.
It's tax time, and that means fraudsters are once again using phishing and deception to trick those who have access to staff member's W-2 tax forms into turning them over. Experts offer advice on steps to take to minimize the risk of your organization falling victim.
An overlooked security setting on Twitter may have allowed a hacker to guess the password-reset email addresses tied to accounts used by President Donald Trump, first lady Melania Trump, Vice President Mike Pence plus a top adviser. What's the risk?
Phishing attacks remain the largest challenge to organizations because they target all employees.
Download the 2016 Enterprise Phishing Susceptibility and Resiliency Report that examines the factors that lead to successful phishing campaigns, how empowering employees to report impacts susceptibility and...
The growing sophistication and fast-evolving nature of cyberthreats have made data breach preparedness a critical issue for enterprises.
Download this interactive infographic to learn the surprising statistics and how you can adjust to make sure your resources are aligned with strategic security requirements.
The number of reported U.S. data breaches hit an all-time high in 2016, according to Identity Theft Resource Center. But for half of all breaches, the number of exposed records isn't known. And what about all of the breaches that just haven't come to light?
Dutch police reveal they arrested an e-commerce website developer on charges of installing backdoors that allowed him to siphon 20,000 email addresses and passwords, which he then allegedly used to commit fraud using some old-school tactics.
Yet another power blackout in Ukraine was the result of attackers striking via spear-phishing emails and malware, researchers have confirmed. Ukraine's president blamed the campaign on Russia and said it disrupted a number of critical infrastructure targets.
Despite significant investments in the signature-based defenses of today's network, email and endpoint security solutions, since 2010, these solutions have been ineffective against the sheer volume of evolving malware. Security and risk professionals have turned to automated malware analysis (AMA) for help. These...