Phishing December 15, 2015 Ian Palmer When Basic Security Training MIGHT Be Enough When there are people who still open attachments willy-nilly, who click on links with reckless abandon and who let their guard down even though legitimate-looking...
Phishing November 10, 2015 Daniel Dimov The Most Popular Social Network Phishing Schemes Social networks have become a trusted communication medium for both personal and professional communication. However, hackers regularly exploit the trust of...
Phishing September 29, 2015 Daniel Dimov Online Rental Scams The technology today enables us to perform a big part of our activities online. Finding a romantic partner, working, doing weekly grocery shopping, learning...
Phishing September 25, 2015 Poojitha Trivedi What’s Worse: APTs or Spear Phishing? In this article, we are going to look into advance persistent threat (APT) and spear phishing, the role of spear phishing in APT attacks, the level of difficulty...
Phishing September 4, 2015 Daniel Brecht A Brief History of Spear Phishing [download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a...
Phishing September 3, 2015 Peter Lindley Spear Phishing Attacks and Countermeasures [download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a...
Phishing August 19, 2015 Ivan Dimov Spear-phishing statistics from 2014-2015 [download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a...
Phishing August 7, 2015 Daniel Brecht Can Security Awareness Prevent Spearphishing? [download]Download the BEST PRACTICES FOR DEVELOPING AN ENGAGING SECURITY AWARENESS PROGRAM whitepaper[/download] Learn the best practices for developing a...
Phishing May 8, 2015 Dimitar Kostadinov “Phishing” is the Name of the Game Intro to the Concept Phishing is an Internet identity fraud that a malicious actor employs to dupe unsuspecting online users into revealing their confidential...
Phishing May 5, 2015 Pierluigi Paganini Spearphishing: A New Weapon in Cyber Terrorism Spear phishing and its evolutions like the watering hole attack represent one of the most insidious attack techniques adopted by the majority of threat actors...