phishing

New multi platform malware/adware spreading via Facebook Messenger

New multi platform malware/adware spreading via Facebook Messenger

One good thing about having a lot of Facebook friends is that you simply act as a honey pot when your friends click on malicious things. A few days ago I got a message on Facebook from a person I very rarely speak to, and I knew that something fishy was going on.  

Spam and phishing in Q2 2017

Spam and phishing in Q2 2017

In Q2 2017, the average share of spam in global email traffic amounted to 56.97%, which was only 1.07 p.p. more than in the previous quarter. One of the most notable events of this quarter – the WannaCry epidemic – did not go unnoticed by spammers: numerous mass mailings contained offers of assistance in combating the ransomware.  

Phishing: The basics

Phishing: The basics

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Typically, a phisher sends an e-mail disguised as a legitimate business request. Because the best defense is a skeptical user, here's how to be on your guard against phishing.

Nigerian phishing: Industrial companies under attack

Nigerian phishing: Industrial companies under attack

In October 2016, Kaspersky Lab products detected a surge in malware infection attempts on the computers of its customers who had industrial control systems installed. This was just part of the bigger story.

What makes identity-driven security the new age firewall

What makes identity-driven security the new age firewall

Propelled by the need to provide a holistic, identity-driven protection, Microsoft’s Enterprise Mobility & Security solutions (EM&S) stitches in intuitive security on a future-ready platform. What takes the cake though, is that it ensures productivity without compromising on user privilege.

Detecting and Responding to a Ransomware Attack

Detecting and Responding to a Ransomware Attack

Ransomware attackers are motivated entirely by money, and they go after your high-value data.Here’s how one common type of Ransomware exploit happens, and what can be done to stop it.

Load More