Phishing June 25, 2017 Infosec Anti-Phishing: The Importance of Phishing Awareness Training Of all the precautions you need to take to keep your company afloat, planning for phishing attacks may be the most important by far. Phishing has become a widespread...
Phishing June 22, 2017 Infosec Introduction to Anti-Phishing Throughout the course of your day, think about all the clicking you do with your mouse. You click again and again while opening a never-ending stream of emails. You...
Phishing June 8, 2017 Dimitar Kostadinov How to Protect Your Right to Personal Identity in the Digital Era As stated by the FBI's Internet Crime Complaint Center (IC3), identity theft "occurs when someone appropriates another's personal information without their...
Phishing May 30, 2017 Daniel Dimov How to Recognize Phishing Emails People all over the world get phishing emails on a daily basis. Email inboxes are full of suspicious requests to confirm bank transactions, respond to social...
Phishing May 12, 2017 Susan Morrow Dropbox Phishing Attacks- Templates and Examples Dropbox, the handy Cloud based storage for files, has been one of those amazing tech success stories. As of May 2016, Dropbox had over 500 million registered...
Phishing May 9, 2017 Irfan Shakeel Sophisticated Phishing Attack Targets Google Docs Users On Wednesday afternoon, social media flooded with news of a new Phishing attack targeting users of Google Docs. The attack was quick, smart on getting the victim...
Phishing May 1, 2017 Infosec Error Message Phishing Attacks- Templates, Examples & Prevention Strategy If your target is comprised of mostly low-tech staff members then attackers may opt to leverage seemingly legitimate technical data to entice users to follow...
Phishing April 25, 2017 Chiragh Dewan Top Ten Phishing Scams Image taken from CSO Online In October 2014, the Dyre, also known as Dyreza, infected more than 20,000 people via phishing campaigns. Dyreza banking malware...
Phishing April 23, 2017 Infosec The Unhappy Boss Large organizations have an added pressure of having so much organizational information publicly available on the Internet. If an attacker has performed due...
Phishing April 22, 2017 Infosec How Phishing Attacks Bypass Spam Filters A successful phishing campaign has at least three common denominators, which are accurate target information, successful message delivery, and execution of...